General
-
Target
4a508f74cec687fa4976f4034a424d83a351201755b07351563c07addc622f8cN.exe
-
Size
616KB
-
Sample
241129-flrllawqhz
-
MD5
8c9614d97173e2afa602be50fccec1d0
-
SHA1
26790a2b3b7d21ed9303865e22edc66644545e3c
-
SHA256
4a508f74cec687fa4976f4034a424d83a351201755b07351563c07addc622f8c
-
SHA512
8db74b48149d94876cccd587a0c4d161095d3c79b17bb9af0f5601c24857644f1528c0121fd4b5e817c3184a4926dfae96561afb04a505555d5c6fc019c42fab
-
SSDEEP
12288:ZqkZpmvsQtqB5urTIoYWBQk1E+VF9mOx9SQL0+4:wsQtqBorTlYWBhE+V3mO5U
Static task
static1
Behavioral task
behavioral1
Sample
4a508f74cec687fa4976f4034a424d83a351201755b07351563c07addc622f8cN.exe
Resource
win7-20240903-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.ru - Port:
587 - Username:
[email protected] - Password:
dtyjnsyxuroscsgo
Targets
-
-
Target
4a508f74cec687fa4976f4034a424d83a351201755b07351563c07addc622f8cN.exe
-
Size
616KB
-
MD5
8c9614d97173e2afa602be50fccec1d0
-
SHA1
26790a2b3b7d21ed9303865e22edc66644545e3c
-
SHA256
4a508f74cec687fa4976f4034a424d83a351201755b07351563c07addc622f8c
-
SHA512
8db74b48149d94876cccd587a0c4d161095d3c79b17bb9af0f5601c24857644f1528c0121fd4b5e817c3184a4926dfae96561afb04a505555d5c6fc019c42fab
-
SSDEEP
12288:ZqkZpmvsQtqB5urTIoYWBQk1E+VF9mOx9SQL0+4:wsQtqBorTlYWBhE+V3mO5U
-
Hawkeye family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-