General
-
Target
e6fc0ab6433293450d1565483d6f3c6a7d3597631f496a28066a35ea6e5fb2b5
-
Size
599KB
-
Sample
241024-cjbwkssall
-
MD5
765b3afa0a3723a310498aee4cd2c7ad
-
SHA1
0b6d5641f72eaec95b4e91347ddc275e20b0d30b
-
SHA256
e6fc0ab6433293450d1565483d6f3c6a7d3597631f496a28066a35ea6e5fb2b5
-
SHA512
1c21fc509500df9f12331e9c3e115d6555453e901da2dbd8dcc61efcf3715885eaa5e94342dfd14d7bca2823fa50e4d6af02456dc5111a72a97300b8400786aa
-
SSDEEP
12288:9sDAN6pUPYfHT+O+y4cdj0twls9G88NEbVorUMnXivXbLAd4asHrG:qgKUAfH6Oqcdjuwl+1ETFkbM4aarG
Static task
static1
Behavioral task
behavioral1
Sample
e6fc0ab6433293450d1565483d6f3c6a7d3597631f496a28066a35ea6e5fb2b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e6fc0ab6433293450d1565483d6f3c6a7d3597631f496a28066a35ea6e5fb2b5.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
panel.freehosting.com - Port:
21 - Username:
bacaloda - Password:
2wz3J81jLx
Targets
-
-
Target
e6fc0ab6433293450d1565483d6f3c6a7d3597631f496a28066a35ea6e5fb2b5
-
Size
599KB
-
MD5
765b3afa0a3723a310498aee4cd2c7ad
-
SHA1
0b6d5641f72eaec95b4e91347ddc275e20b0d30b
-
SHA256
e6fc0ab6433293450d1565483d6f3c6a7d3597631f496a28066a35ea6e5fb2b5
-
SHA512
1c21fc509500df9f12331e9c3e115d6555453e901da2dbd8dcc61efcf3715885eaa5e94342dfd14d7bca2823fa50e4d6af02456dc5111a72a97300b8400786aa
-
SSDEEP
12288:9sDAN6pUPYfHT+O+y4cdj0twls9G88NEbVorUMnXivXbLAd4asHrG:qgKUAfH6Oqcdjuwl+1ETFkbM4aarG
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-