General
-
Target
da1ccaece875c6bbd1be6aea06f56148d3c3f51e1c86c6f0178df51672275d27
-
Size
716KB
-
Sample
250117-bzplyaymbp
-
MD5
31d909da217b962f0569defac17363a1
-
SHA1
4c3c4912ee6d48d75cb2e9374b1a347118262f64
-
SHA256
da1ccaece875c6bbd1be6aea06f56148d3c3f51e1c86c6f0178df51672275d27
-
SHA512
f9df5c00f7d7e716bbe871d496ad0732ec7c51ecbbdb3bd8859ad0125658f2742e10d795cd832795fc440eaa60ea49a74bdd3b1431bd35426e3bc794a96715d5
-
SSDEEP
6144:hWusAIFB++velibxPyp/64wjOjn6cB3rZtT/Yq3v9Auky+4N1v9Dj:hz7IFjvelQypyfy7z6u7+4Dv9Dj
Static task
static1
Behavioral task
behavioral1
Sample
da1ccaece875c6bbd1be6aea06f56148d3c3f51e1c86c6f0178df51672275d27.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
da1ccaece875c6bbd1be6aea06f56148d3c3f51e1c86c6f0178df51672275d27.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
Protocol: smtp- Host:
smtp.yandex.com - Port:
587 - Username:
[email protected] - Password:
Boy12345#
Targets
-
-
Target
da1ccaece875c6bbd1be6aea06f56148d3c3f51e1c86c6f0178df51672275d27
-
Size
716KB
-
MD5
31d909da217b962f0569defac17363a1
-
SHA1
4c3c4912ee6d48d75cb2e9374b1a347118262f64
-
SHA256
da1ccaece875c6bbd1be6aea06f56148d3c3f51e1c86c6f0178df51672275d27
-
SHA512
f9df5c00f7d7e716bbe871d496ad0732ec7c51ecbbdb3bd8859ad0125658f2742e10d795cd832795fc440eaa60ea49a74bdd3b1431bd35426e3bc794a96715d5
-
SSDEEP
6144:hWusAIFB++velibxPyp/64wjOjn6cB3rZtT/Yq3v9Auky+4N1v9Dj:hz7IFjvelQypyfy7z6u7+4Dv9Dj
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
5Credentials In Files
4Credentials in Registry
1