General
-
Target
skin igorek OSU!.exe
-
Size
572KB
-
Sample
240708-y7kdhszard
-
MD5
a1155341929e15e4c7c1010ebad945ed
-
SHA1
bedea7dfff13ae16d872d5600c4b9f299375b3b4
-
SHA256
4fc00071f596b62d408a682bb80b7736fd46c87f212f6d0fe995bf6e8a40c15b
-
SHA512
08b7ac139dd187ee380a4e575b3fabf0c837521dc216460e7270e5cafac52ad49320f45414df82f5e50a656dfee84431131c345910e753ffa198e6bf9ef19e50
-
SSDEEP
6144:rBlbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9T9I:NlQtqB5urTIoYWBQk1E+VF9mOx9i
Static task
static1
Behavioral task
behavioral1
Sample
skin igorek OSU!.exe
Resource
win7-20240704-de
Behavioral task
behavioral2
Sample
skin igorek OSU!.exe
Resource
win10-20240404-de
Malware Config
Extracted
Protocol: smtp- Host:
poczta.interia.pl - Port:
587 - Username:
[email protected] - Password:
Mruczek123
Targets
-
-
Target
skin igorek OSU!.exe
-
Size
572KB
-
MD5
a1155341929e15e4c7c1010ebad945ed
-
SHA1
bedea7dfff13ae16d872d5600c4b9f299375b3b4
-
SHA256
4fc00071f596b62d408a682bb80b7736fd46c87f212f6d0fe995bf6e8a40c15b
-
SHA512
08b7ac139dd187ee380a4e575b3fabf0c837521dc216460e7270e5cafac52ad49320f45414df82f5e50a656dfee84431131c345910e753ffa198e6bf9ef19e50
-
SSDEEP
6144:rBlbS/QTjhUqBfxrwEnuNcSsm7IoYGW0VvBXCAt6kihwE+VDpJYWmlwnx9T9I:NlQtqB5urTIoYWBQk1E+VF9mOx9i
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-