General
-
Target
9bc918be8700644cb1d01a2137c741ea22dc372f99e09ac3b4eebe1493f6852b
-
Size
52KB
-
Sample
240709-h9c48aseml
-
MD5
6def0b2dddde3d345687230830688ac5
-
SHA1
84bc7dfb5f3d048ea0bdb39f74023bfae60c1a31
-
SHA256
9bc918be8700644cb1d01a2137c741ea22dc372f99e09ac3b4eebe1493f6852b
-
SHA512
a5bfa49a95676049ebf7a1f8132cf51c1d1d567454311f808802155057756e34a363f2be89d8e21ba5ae4764319faf79d34611ea0121aae52e973a95cfe75118
-
SSDEEP
1536:WZ8NR1I3XWp4y8eFZhM33+Vm1ag7EWOqrY:dNRu3XWB8eFAHKmkg8b
Static task
static1
Behavioral task
behavioral1
Sample
e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764.vbs
Resource
win10v2004-20240704-en
Malware Config
Targets
-
-
Target
e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764.vbs
-
Size
102KB
-
MD5
b7967a2db392f9d8694734c554f06183
-
SHA1
0386c4437465eb5bd4c6a21938e99af3c9f748c7
-
SHA256
e33fda9ea628ee0efe54b54a20a9e6aff7cd64d293f3b67c71f11d3035c17764
-
SHA512
89223646bfb92ccf336c539f82fbab7f4e0cb35aab0779631702319504590947480338443f991500b6e3044d4d3c3cef30b45558f8382fa05e9a780426e1e8e5
-
SSDEEP
3072:h4oGKaBSPReHzR0WAjT28fyxa+CS64B9Ou4rIQCtvvNZ:2t7SPReHd0WoT28faa+CS64mu8IQCtvn
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-