General
-
Target
b13adc656bdc9a6425b6075e7f016debcea9cca87ccdc9faca337a03f31b4c79.vbs
-
Size
102KB
-
Sample
240709-cfgbwsshng
-
MD5
01c94fd161a6999247d5f39f63bdeecf
-
SHA1
f5da84dd0df3da70aa7cc5167d3a870aec691bd8
-
SHA256
b13adc656bdc9a6425b6075e7f016debcea9cca87ccdc9faca337a03f31b4c79
-
SHA512
ac62e8e35dff33dec16b4cb9faed77dbbe8e5b51d1576495d12aed0eb0ab81f92ae6af6087441e812a7ce9a102898ed4e5622e68b87c5d6b7b8d9999dd599a1d
-
SSDEEP
3072:c4oGKaBSPReHzR0WAjT28fyxa+CS64B9Ou4rIQCtvfCS5x:pt7SPReHd0WoT28faa+CS64mu8IQCtv/
Static task
static1
Behavioral task
behavioral1
Sample
b13adc656bdc9a6425b6075e7f016debcea9cca87ccdc9faca337a03f31b4c79.vbs
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b13adc656bdc9a6425b6075e7f016debcea9cca87ccdc9faca337a03f31b4c79.vbs
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
b13adc656bdc9a6425b6075e7f016debcea9cca87ccdc9faca337a03f31b4c79.vbs
-
Size
102KB
-
MD5
01c94fd161a6999247d5f39f63bdeecf
-
SHA1
f5da84dd0df3da70aa7cc5167d3a870aec691bd8
-
SHA256
b13adc656bdc9a6425b6075e7f016debcea9cca87ccdc9faca337a03f31b4c79
-
SHA512
ac62e8e35dff33dec16b4cb9faed77dbbe8e5b51d1576495d12aed0eb0ab81f92ae6af6087441e812a7ce9a102898ed4e5622e68b87c5d6b7b8d9999dd599a1d
-
SSDEEP
3072:c4oGKaBSPReHzR0WAjT28fyxa+CS64B9Ou4rIQCtvfCS5x:pt7SPReHd0WoT28faa+CS64mu8IQCtv/
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-