General
-
Target
1c995e8f_by_Libranalysis
-
Size
868KB
-
Sample
210525-tbyjhk6gge
-
MD5
1c995e8f4af85982a6bd26019369ef62
-
SHA1
9cd0055ad7599440f852329e4ba3f2e6d7b76565
-
SHA256
7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce
-
SHA512
73a454656de2dbe2c402b750b9961f43184fa5c9670eba561bbf3d3126917fa3ee3f74e20c0f676d4536613ee3840fa63bda9f8ba12af2d1f1293938342aaf31
Static task
static1
Behavioral task
behavioral1
Sample
1c995e8f_by_Libranalysis.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
1c995e8f_by_Libranalysis.exe
Resource
win10v20210410
Malware Config
Targets
-
-
Target
1c995e8f_by_Libranalysis
-
Size
868KB
-
MD5
1c995e8f4af85982a6bd26019369ef62
-
SHA1
9cd0055ad7599440f852329e4ba3f2e6d7b76565
-
SHA256
7db01b21b6b4c6e977c8f96e204495b11d566c780c51198198195ec7045c7dce
-
SHA512
73a454656de2dbe2c402b750b9961f43184fa5c9670eba561bbf3d3126917fa3ee3f74e20c0f676d4536613ee3840fa63bda9f8ba12af2d1f1293938342aaf31
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty Payload
-
A310logger Executable
-
CustAttr .NET packer
Detects CustAttr .NET packer in memory.
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-