General
-
Target
495edc6456f3c1d7dcdf839ec8a1fc70.exe
-
Size
935KB
-
Sample
210713-wrpxr4awfa
-
MD5
495edc6456f3c1d7dcdf839ec8a1fc70
-
SHA1
fe30c475e506a76be7ea15c4f529938062718276
-
SHA256
3504fe4b0e2d093c366cffa43ceb37026d7a5f8e35498aa7945556c77ecce731
-
SHA512
b2122cd4b6a1b1f46f8e3b970ccd786ca6a07a554772a7ddebab9d7dc42ea7a12288debdccc3ec5af63fd6d707b3e804e3e13cfd2d4fbe7e2aec11abea4e1b1a
Static task
static1
Behavioral task
behavioral1
Sample
495edc6456f3c1d7dcdf839ec8a1fc70.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
495edc6456f3c1d7dcdf839ec8a1fc70.exe
Resource
win10v20210410
Malware Config
Targets
-
-
Target
495edc6456f3c1d7dcdf839ec8a1fc70.exe
-
Size
935KB
-
MD5
495edc6456f3c1d7dcdf839ec8a1fc70
-
SHA1
fe30c475e506a76be7ea15c4f529938062718276
-
SHA256
3504fe4b0e2d093c366cffa43ceb37026d7a5f8e35498aa7945556c77ecce731
-
SHA512
b2122cd4b6a1b1f46f8e3b970ccd786ca6a07a554772a7ddebab9d7dc42ea7a12288debdccc3ec5af63fd6d707b3e804e3e13cfd2d4fbe7e2aec11abea4e1b1a
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty Payload
-
A310logger Executable
-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-