General
-
Target
a016c13d92b2950a5494db8916dd77ba
-
Size
709KB
-
Sample
240216-lzrfmsge77
-
MD5
a016c13d92b2950a5494db8916dd77ba
-
SHA1
8113747da58ffaf3964850704eed9ae32eeed846
-
SHA256
0614874d49a085d84f0a2a71f370dff23a9898ee64a190d6cade492e4b91643d
-
SHA512
2fe6ec7044276bc6d1631db75edd14dd6f7f756a1240580b686b7f93328726b7f4553a47db0b7c36624f919f9a81e17eb99e73225f9ff085de252133325bec76
-
SSDEEP
12288:hnSLWoo7Zhx72JkQZvvkFMuYrIFmmh6JiBaA6Pt83cCS:RSLWZj7PQ5LamgaHV8zS
Static task
static1
Behavioral task
behavioral1
Sample
a016c13d92b2950a5494db8916dd77ba.exe
Resource
win7-20231129-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
samsung@@
Targets
-
-
Target
a016c13d92b2950a5494db8916dd77ba
-
Size
709KB
-
MD5
a016c13d92b2950a5494db8916dd77ba
-
SHA1
8113747da58ffaf3964850704eed9ae32eeed846
-
SHA256
0614874d49a085d84f0a2a71f370dff23a9898ee64a190d6cade492e4b91643d
-
SHA512
2fe6ec7044276bc6d1631db75edd14dd6f7f756a1240580b686b7f93328726b7f4553a47db0b7c36624f919f9a81e17eb99e73225f9ff085de252133325bec76
-
SSDEEP
12288:hnSLWoo7Zhx72JkQZvvkFMuYrIFmmh6JiBaA6Pt83cCS:RSLWZj7PQ5LamgaHV8zS
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-