General
-
Target
acbe388dc869bfd90eb95a39428ca06098fe128d27763b240b491e5d8ae38e91.exe
-
Size
1.1MB
-
Sample
241231-hshy5szmcp
-
MD5
f17541c37cd429e19841423923d9b710
-
SHA1
256d9b340fb5dd96e3143ec76c76d8c66d877f4b
-
SHA256
acbe388dc869bfd90eb95a39428ca06098fe128d27763b240b491e5d8ae38e91
-
SHA512
1e70278613ab0684933a2fc60c413c2adcf9f00ce0bfeccd2395733f1ac45654bd3e51649a1877ce7457153151c7f770150aee67cc46f90b740ce7597bd71edc
-
SSDEEP
24576:tUktJwwEPcHc2bDCn4bQAKg9Iwv1b8QW5AeIG3Z09CW:tfFEUBb2HAtNmZ0QW
Static task
static1
Behavioral task
behavioral1
Sample
acbe388dc869bfd90eb95a39428ca06098fe128d27763b240b491e5d8ae38e91.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
acbe388dc869bfd90eb95a39428ca06098fe128d27763b240b491e5d8ae38e91.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: ftp- Host:
panel.freehosting.com - Port:
21 - Username:
bilonocc - Password:
VtZu7za518
Targets
-
-
Target
acbe388dc869bfd90eb95a39428ca06098fe128d27763b240b491e5d8ae38e91.exe
-
Size
1.1MB
-
MD5
f17541c37cd429e19841423923d9b710
-
SHA1
256d9b340fb5dd96e3143ec76c76d8c66d877f4b
-
SHA256
acbe388dc869bfd90eb95a39428ca06098fe128d27763b240b491e5d8ae38e91
-
SHA512
1e70278613ab0684933a2fc60c413c2adcf9f00ce0bfeccd2395733f1ac45654bd3e51649a1877ce7457153151c7f770150aee67cc46f90b740ce7597bd71edc
-
SSDEEP
24576:tUktJwwEPcHc2bDCn4bQAKg9Iwv1b8QW5AeIG3Z09CW:tfFEUBb2HAtNmZ0QW
-
Hawkeye family
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses Microsoft Outlook accounts
-
Adds Run key to start application
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-