General
-
Target
954979___773b92be-2504-4962-92bc-ebe1003ee0c8.exe
-
Size
648KB
-
Sample
241119-t1m4lsxrfs
-
MD5
548a180766b53ea59fd0bdc2ac0793b0
-
SHA1
3ff13cb1ab16a65d25061d68a0f2cf801cfb2972
-
SHA256
462ee3cd85dede72db4ba090bdbfdf16aade2778cfb23843d70c552bccd5fc57
-
SHA512
667dba2f3911a2214db08114f0b0c58925c267d5ed4cc40c3361cf529d3563c1f4e29f0ea6ceee62ea319a0ac370a55a714c582fe22673ff36c28a69175812f2
-
SSDEEP
12288:PA2pA0GA0d0d2h3ZBiU5WrLrSwl816oSI:ZYdEGiU5KL+uoSI
Static task
static1
Behavioral task
behavioral1
Sample
954979___773b92be-2504-4962-92bc-ebe1003ee0c8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
954979___773b92be-2504-4962-92bc-ebe1003ee0c8.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
173.237.185.61 - Port:
587 - Username:
[email protected] - Password:
7213575aceACE@.
Targets
-
-
Target
954979___773b92be-2504-4962-92bc-ebe1003ee0c8.exe
-
Size
648KB
-
MD5
548a180766b53ea59fd0bdc2ac0793b0
-
SHA1
3ff13cb1ab16a65d25061d68a0f2cf801cfb2972
-
SHA256
462ee3cd85dede72db4ba090bdbfdf16aade2778cfb23843d70c552bccd5fc57
-
SHA512
667dba2f3911a2214db08114f0b0c58925c267d5ed4cc40c3361cf529d3563c1f4e29f0ea6ceee62ea319a0ac370a55a714c582fe22673ff36c28a69175812f2
-
SSDEEP
12288:PA2pA0GA0d0d2h3ZBiU5WrLrSwl816oSI:ZYdEGiU5KL+uoSI
-
Hawkeye family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1