General
-
Target
95ba95cad998d07b406c4b6161274e89
-
Size
1.7MB
-
Sample
240212-afb13ada6t
-
MD5
95ba95cad998d07b406c4b6161274e89
-
SHA1
457a7b403eec2863716eaa5f2e0dc6c6c4a834b8
-
SHA256
35611bfb7b38f17960d97815bf31b02fc0625cb9a839951f4beedb56de5e81d9
-
SHA512
4a83be49e87d53eb61de227ab82c96bec169199b8dd7984235a0aacfe9ce55eaba5f54d7bbe4fd0701a430a56dea2dbbbbdf2e6e35490912c1f6d6d12f61107d
-
SSDEEP
49152:Ta3Pt9AYZmGR7Q7afTDuY1tRHVMyi07Tg:u3OGhQ7a7DuG7Vaw
Static task
static1
Behavioral task
behavioral1
Sample
95ba95cad998d07b406c4b6161274e89.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
95ba95cad998d07b406c4b6161274e89.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
95ba95cad998d07b406c4b6161274e89
-
Size
1.7MB
-
MD5
95ba95cad998d07b406c4b6161274e89
-
SHA1
457a7b403eec2863716eaa5f2e0dc6c6c4a834b8
-
SHA256
35611bfb7b38f17960d97815bf31b02fc0625cb9a839951f4beedb56de5e81d9
-
SHA512
4a83be49e87d53eb61de227ab82c96bec169199b8dd7984235a0aacfe9ce55eaba5f54d7bbe4fd0701a430a56dea2dbbbbdf2e6e35490912c1f6d6d12f61107d
-
SSDEEP
49152:Ta3Pt9AYZmGR7Q7afTDuY1tRHVMyi07Tg:u3OGhQ7a7DuG7Vaw
-
Modifies firewall policy service
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1