General
-
Target
b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe
-
Size
558KB
-
Sample
241119-w1sefazhjk
-
MD5
c65d4758015f3e3428b96dcd37cf7138
-
SHA1
407f4c7a1d548b45cf7dfbe5babc7f41ab787740
-
SHA256
b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82
-
SHA512
9aec87bf42d018a232be1bb1b8a83b1c032f276d6d0290b4eaae0f1c3db0c052631a2ad9158f015f933574d04d2a6b7fe55fd592eba49129473f1da7dbb36c36
-
SSDEEP
12288:K6Wq4aaE6KwyF5L0Y2D1PqL9QoPyW1+Ej/TqVde8G7g:othEVaPqLGo6IbEdjKg
Behavioral task
behavioral1
Sample
b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82.exe
-
Size
558KB
-
MD5
c65d4758015f3e3428b96dcd37cf7138
-
SHA1
407f4c7a1d548b45cf7dfbe5babc7f41ab787740
-
SHA256
b4b7d2a2c7d37a0e58d4459f688f498eefecb2b8be0db9ee808c95ecd52cbb82
-
SHA512
9aec87bf42d018a232be1bb1b8a83b1c032f276d6d0290b4eaae0f1c3db0c052631a2ad9158f015f933574d04d2a6b7fe55fd592eba49129473f1da7dbb36c36
-
SSDEEP
12288:K6Wq4aaE6KwyF5L0Y2D1PqL9QoPyW1+Ej/TqVde8G7g:othEVaPqLGo6IbEdjKg
Score7/10-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-