General
-
Target
2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear
-
Size
660KB
-
Sample
241011-xqcrnsybpf
-
MD5
03a5ea04ef15bca68edf74f38463087e
-
SHA1
ce7ffb5982cb5c5a66854d4931c6be802b06cf3e
-
SHA256
0dfb3176683efa54883d71a9c575d15f2fcee4293e53dd99db71d9bdfed9913f
-
SHA512
5f9df5ec1e8338ef0935329decce78f1699dd835a48faacb869212c72e8fef0b6384c8c0e12abf19f41edd76366e9b9ee55152550025839a348ecd3ebde4b706
-
SSDEEP
12288:u2hpKuNFgElu1Wt2yAS6yFQTWnk1q1vvG2eZkmMwP3OI4kDkRpzA8aR:u2HKQNlZtlAS6yFMOPTVsqrAF
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
2024-10-11_03a5ea04ef15bca68edf74f38463087e_hiddentear
-
Size
660KB
-
MD5
03a5ea04ef15bca68edf74f38463087e
-
SHA1
ce7ffb5982cb5c5a66854d4931c6be802b06cf3e
-
SHA256
0dfb3176683efa54883d71a9c575d15f2fcee4293e53dd99db71d9bdfed9913f
-
SHA512
5f9df5ec1e8338ef0935329decce78f1699dd835a48faacb869212c72e8fef0b6384c8c0e12abf19f41edd76366e9b9ee55152550025839a348ecd3ebde4b706
-
SSDEEP
12288:u2hpKuNFgElu1Wt2yAS6yFQTWnk1q1vvG2eZkmMwP3OI4kDkRpzA8aR:u2HKQNlZtlAS6yFMOPTVsqrAF
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-