General
-
Target
a45f737d63d4e31ccec2181edcb52530N.exe
-
Size
1.3MB
-
Sample
240806-plp77sygjq
-
MD5
a45f737d63d4e31ccec2181edcb52530
-
SHA1
f15c95e761b5244401194a9715a55523623f94b6
-
SHA256
4d74c1cc5bc8cc81ed8a50ba960faf005b12c555fcbd18da35b9c30429652e53
-
SHA512
99a740f6507158d6c6e2c3a45ea79ac51d675abf9681ea453471b850ac89a3942e20c4041dff236b1b2a48ee3d4dec88b13d9a4a043fccb9e34ff4768126194a
-
SSDEEP
24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8aWcMhC/3X38K6aR5sVNmM:ATvC/MTQYxsWR7aWvs8KbXGc
Static task
static1
Behavioral task
behavioral1
Sample
a45f737d63d4e31ccec2181edcb52530N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a45f737d63d4e31ccec2181edcb52530N.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
a45f737d63d4e31ccec2181edcb52530N.exe
-
Size
1.3MB
-
MD5
a45f737d63d4e31ccec2181edcb52530
-
SHA1
f15c95e761b5244401194a9715a55523623f94b6
-
SHA256
4d74c1cc5bc8cc81ed8a50ba960faf005b12c555fcbd18da35b9c30429652e53
-
SHA512
99a740f6507158d6c6e2c3a45ea79ac51d675abf9681ea453471b850ac89a3942e20c4041dff236b1b2a48ee3d4dec88b13d9a4a043fccb9e34ff4768126194a
-
SSDEEP
24576:AqDEvCTbMWu7rQYlBQcBiT6rprG8aWcMhC/3X38K6aR5sVNmM:ATvC/MTQYxsWR7aWvs8KbXGc
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-