General
-
Target
409021962f521632561d4cb8b5ff2a1a
-
Size
2.9MB
-
Sample
240104-l21r4afhc5
-
MD5
409021962f521632561d4cb8b5ff2a1a
-
SHA1
1ce4ef8554a104087c4c70ec9946e0156f7f6fda
-
SHA256
c8f5eb62c605962a4705a52a75280589a8b26952613ad093289036b2ed404627
-
SHA512
380cd71d27a17bb237841afc2f3d7ca6d87658b8a778f2d2b595910b79ad3268e51b0000493be9d4dc79fef5bd2902a3e95982d6a194d006c487171bd70ebc29
-
SSDEEP
24576:gRmJkcoQricOIQxiZY1iamoEZ3dMo2+6mTY4E4yKTiFWH+zuwfsUNXzpdenr/gT4:VJZoQrbTFZY1iamf
Static task
static1
Behavioral task
behavioral1
Sample
409021962f521632561d4cb8b5ff2a1a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
409021962f521632561d4cb8b5ff2a1a.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
Google.@12
Targets
-
-
Target
409021962f521632561d4cb8b5ff2a1a
-
Size
2.9MB
-
MD5
409021962f521632561d4cb8b5ff2a1a
-
SHA1
1ce4ef8554a104087c4c70ec9946e0156f7f6fda
-
SHA256
c8f5eb62c605962a4705a52a75280589a8b26952613ad093289036b2ed404627
-
SHA512
380cd71d27a17bb237841afc2f3d7ca6d87658b8a778f2d2b595910b79ad3268e51b0000493be9d4dc79fef5bd2902a3e95982d6a194d006c487171bd70ebc29
-
SSDEEP
24576:gRmJkcoQricOIQxiZY1iamoEZ3dMo2+6mTY4E4yKTiFWH+zuwfsUNXzpdenr/gT4:VJZoQrbTFZY1iamf
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-