General
-
Target
OurHack2.0.exe
-
Size
424KB
-
Sample
240701-nehdca1hpm
-
MD5
4a1213a8c757f3c6c02e098e6a6b99c3
-
SHA1
4865d8f010a0929f3dabc631875699738b2c3e7b
-
SHA256
7ca4702709ff125a7ec1e503b4358a3a8cb5cc282f57b262589e5c113c461b83
-
SHA512
1613e0ae56a57a6e7935f4e7166c3c4e5b2a5683eb685d136fd32677e8c6f316d16c70064ba13e1101b6477f4fee68864358e091e0e7ab66b30e304b7c8d87c0
-
SSDEEP
12288:pzDTo+c8NlvH0tGJjeM5u8v+VmlE2GLJ0uQ:9xbP0tkaM5Rwm62001
Static task
static1
Behavioral task
behavioral1
Sample
OurHack2.0.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
Protocol: ftp- Host:
files.000webhost.com - Port:
21 - Username:
kgarbuz2000
Targets
-
-
Target
OurHack2.0.exe
-
Size
424KB
-
MD5
4a1213a8c757f3c6c02e098e6a6b99c3
-
SHA1
4865d8f010a0929f3dabc631875699738b2c3e7b
-
SHA256
7ca4702709ff125a7ec1e503b4358a3a8cb5cc282f57b262589e5c113c461b83
-
SHA512
1613e0ae56a57a6e7935f4e7166c3c4e5b2a5683eb685d136fd32677e8c6f316d16c70064ba13e1101b6477f4fee68864358e091e0e7ab66b30e304b7c8d87c0
-
SSDEEP
12288:pzDTo+c8NlvH0tGJjeM5u8v+VmlE2GLJ0uQ:9xbP0tkaM5Rwm62001
Score10/10-
NirSoft MailPassView
Password recovery tool for various email clients
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Nirsoft
-
Executes dropped EXE
-
Accesses Microsoft Outlook accounts
-