General
-
Target
2c6ffa6e812c876dbf207473c2f969fbe1e3f94560befd6611352cbce28bb676
-
Size
405KB
-
Sample
210713-aqfbq387bs
-
MD5
33f746bc5fc31d6791ed7babf794f894
-
SHA1
e123d85bb6b8dacd57068828dad6640327f327a4
-
SHA256
2c6ffa6e812c876dbf207473c2f969fbe1e3f94560befd6611352cbce28bb676
-
SHA512
13a14ebb85fe3716041ab4909033e1136a1a939e9bc13f8eb8429dca91ee15d14881ec3e5b7b61d1d9e10d3ad65d873a9dd9eee454b952a8199f731e59f3e4a8
Static task
static1
Behavioral task
behavioral1
Sample
2c6ffa6e812c876dbf207473c2f969fbe1e3f94560befd6611352cbce28bb676.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
2c6ffa6e812c876dbf207473c2f969fbe1e3f94560befd6611352cbce28bb676.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
2c6ffa6e812c876dbf207473c2f969fbe1e3f94560befd6611352cbce28bb676
-
Size
405KB
-
MD5
33f746bc5fc31d6791ed7babf794f894
-
SHA1
e123d85bb6b8dacd57068828dad6640327f327a4
-
SHA256
2c6ffa6e812c876dbf207473c2f969fbe1e3f94560befd6611352cbce28bb676
-
SHA512
13a14ebb85fe3716041ab4909033e1136a1a939e9bc13f8eb8429dca91ee15d14881ec3e5b7b61d1d9e10d3ad65d873a9dd9eee454b952a8199f731e59f3e4a8
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty Payload
-
A310logger Executable
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-