General
-
Target
d3bb26ad40577d090dff6aa75885be1e29d4ca66d6579d6bd8bc69f51285706b
-
Size
664KB
-
Sample
241113-dksq6aymcj
-
MD5
9a84ed89e2a19d23228d415448d78b7d
-
SHA1
71cb093efeddc214c36c1e3f6ad20d41051c21fa
-
SHA256
d3bb26ad40577d090dff6aa75885be1e29d4ca66d6579d6bd8bc69f51285706b
-
SHA512
86d1f36d701af60f82e7de57c0516f7ced8067a186f959c65478602472f46358cd5af6af93af0cfcd94940437e99f8923e4c2a4fee76c9a6133540514125d678
-
SSDEEP
12288:wcBwhx9C0kfoaHzkHZ+KGo5HwPJRnBNS85CPnhS+p:RBwhx9PoHw+OHwvnBLMPnhS+
Static task
static1
Behavioral task
behavioral1
Sample
d3bb26ad40577d090dff6aa75885be1e29d4ca66d6579d6bd8bc69f51285706b.exe
Resource
win7-20241010-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.fetrix.gr - Port:
587 - Username:
[email protected] - Password:
inf!@#$%^
Targets
-
-
Target
d3bb26ad40577d090dff6aa75885be1e29d4ca66d6579d6bd8bc69f51285706b
-
Size
664KB
-
MD5
9a84ed89e2a19d23228d415448d78b7d
-
SHA1
71cb093efeddc214c36c1e3f6ad20d41051c21fa
-
SHA256
d3bb26ad40577d090dff6aa75885be1e29d4ca66d6579d6bd8bc69f51285706b
-
SHA512
86d1f36d701af60f82e7de57c0516f7ced8067a186f959c65478602472f46358cd5af6af93af0cfcd94940437e99f8923e4c2a4fee76c9a6133540514125d678
-
SSDEEP
12288:wcBwhx9C0kfoaHzkHZ+KGo5HwPJRnBNS85CPnhS+p:RBwhx9PoHw+OHwvnBLMPnhS+
-
Hawkeye family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-