General
-
Target
87482.xlsx
-
Size
1.1MB
-
Sample
210712-xpz3fdls2n
-
MD5
691c1f98e15a9adfad552d13a383900c
-
SHA1
b8b48ea114731bbe1f93074c5e57a7dc877aab36
-
SHA256
7fdb072b859acf022effc3f1033b96b2c7f90faaecac8352c3e39db31c53cdaf
-
SHA512
3ca064d10d8884014c4e56ef542a93afb8a0f1904323a26ac1f006007e74a5ff2414ace9df1bd8025113e87a3872a53f6dd22a893b1787cb666d28b255891fe5
Static task
static1
Behavioral task
behavioral1
Sample
87482.xlsx
Resource
win7v20210408
Behavioral task
behavioral2
Sample
87482.xlsx
Resource
win10v20210408
Malware Config
Targets
-
-
Target
87482.xlsx
-
Size
1.1MB
-
MD5
691c1f98e15a9adfad552d13a383900c
-
SHA1
b8b48ea114731bbe1f93074c5e57a7dc877aab36
-
SHA256
7fdb072b859acf022effc3f1033b96b2c7f90faaecac8352c3e39db31c53cdaf
-
SHA512
3ca064d10d8884014c4e56ef542a93afb8a0f1904323a26ac1f006007e74a5ff2414ace9df1bd8025113e87a3872a53f6dd22a893b1787cb666d28b255891fe5
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty Payload
-
A310logger Executable
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Uses the VBS compiler for execution
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-