General
-
Target
45edc00783917c5995cb40ffe6a82b74
-
Size
1.1MB
-
Sample
231222-btzvqaedd2
-
MD5
45edc00783917c5995cb40ffe6a82b74
-
SHA1
62f4563a5d19b33135192e712ec56348fa64511f
-
SHA256
cc05b8bfca420cf34c2f8625a43cc83914d507b8c9b65f466df0a3d7030c970b
-
SHA512
b555f139e10775a481abca83ed1b17a97bf04f227ef2caa3a3404adc6587c96c8b4e9aae04e195c4f8b8004feda7fa2f5caa0b77301fdad9cf10158459c22d1f
-
SSDEEP
12288:ilO6vQM/PuwMpPMasrHwUFjq16QYBh0RLUXusY+hVKt8Dl5YchUJlyAKp:muoPu1dMasrnFAiQUc+PKeDDJUlWp
Static task
static1
Behavioral task
behavioral1
Sample
45edc00783917c5995cb40ffe6a82b74.exe
Resource
win7-20231215-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.dracik.sk - Port:
587 - Username:
[email protected] - Password:
NoVeHe5L00jhj
Targets
-
-
Target
45edc00783917c5995cb40ffe6a82b74
-
Size
1.1MB
-
MD5
45edc00783917c5995cb40ffe6a82b74
-
SHA1
62f4563a5d19b33135192e712ec56348fa64511f
-
SHA256
cc05b8bfca420cf34c2f8625a43cc83914d507b8c9b65f466df0a3d7030c970b
-
SHA512
b555f139e10775a481abca83ed1b17a97bf04f227ef2caa3a3404adc6587c96c8b4e9aae04e195c4f8b8004feda7fa2f5caa0b77301fdad9cf10158459c22d1f
-
SSDEEP
12288:ilO6vQM/PuwMpPMasrHwUFjq16QYBh0RLUXusY+hVKt8Dl5YchUJlyAKp:muoPu1dMasrnFAiQUc+PKeDDJUlWp
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-