Analysis
-
max time kernel
12s -
max time network
116s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
06-07-2021 17:00
Static task
static1
Behavioral task
behavioral1
Sample
onlylogger.exe
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
onlylogger.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
onlylogger.exe
-
Size
350KB
-
MD5
9749a3a101daeb44a788492db61f6bc0
-
SHA1
599f4e55f2c027ec365fd3ae5f35302458ae88a0
-
SHA256
602d032373668d54b7f96d31362091272b601cd0f313b251cd88625439fb5a82
-
SHA512
00e288efa9f999ed94fb86042c51771fbce16101468d9e9f18171c06c005f0d39cd66df68147ee24b546f22296980db125849afc658571c4666aade8017f6f2b
Score
10/10
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1824-115-0x0000000000400000-0x00000000008F6000-memory.dmp family_onlylogger -
Legitimate hosting services abused for malware hosting/C2 1 TTPs