General
-
Target
fd74acea71f2fa45f1aec7c09df884db
-
Size
529KB
-
Sample
231228-2l5dcaafh2
-
MD5
fd74acea71f2fa45f1aec7c09df884db
-
SHA1
23c5b7d41e303b4cfe7629e4f6dcaf392ff8c0c1
-
SHA256
7323744eda0e6e5e20f7400894380656b075218c78b97aa8179510bc76a7233f
-
SHA512
643b861a5ebfa1c99e65bf92368681f9ca6b6b2fe7f95b212a9cf952809c1f42dd642f220bb1170c53d43dc5572978ab199d10d380fff29fa70bdda50b06f35e
-
SSDEEP
12288:CACVQLPV77E0B6tExW8J9Da2LsvH913KWK26jt:cSJ77vMQnJw33KfXt
Static task
static1
Behavioral task
behavioral1
Sample
fd74acea71f2fa45f1aec7c09df884db.exe
Resource
win7-20231129-en
Malware Config
Extracted
Protocol: smtp- Host:
Smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
iskandar25
Targets
-
-
Target
fd74acea71f2fa45f1aec7c09df884db
-
Size
529KB
-
MD5
fd74acea71f2fa45f1aec7c09df884db
-
SHA1
23c5b7d41e303b4cfe7629e4f6dcaf392ff8c0c1
-
SHA256
7323744eda0e6e5e20f7400894380656b075218c78b97aa8179510bc76a7233f
-
SHA512
643b861a5ebfa1c99e65bf92368681f9ca6b6b2fe7f95b212a9cf952809c1f42dd642f220bb1170c53d43dc5572978ab199d10d380fff29fa70bdda50b06f35e
-
SSDEEP
12288:CACVQLPV77E0B6tExW8J9Da2LsvH913KWK26jt:cSJ77vMQnJw33KfXt
-
Drops file in Drivers directory
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-