Analysis
-
max time kernel
4s -
max time network
46s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
28-07-2021 14:31
Static task
static1
Behavioral task
behavioral1
Sample
mixazed_20210728-153417.exe
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
mixazed_20210728-153417.exe
Resource
win10v20210410
windows10_x64
0 signatures
0 seconds
General
-
Target
mixazed_20210728-153417.exe
-
Size
237KB
-
MD5
521326c41205a777a3ab2a5c8c365f25
-
SHA1
480da7fdb3feea0a1c9028e4e9b3ae20c884b9fa
-
SHA256
5fabd60a67c4394fdce061edc5853d0bcfd5e4a3f8018ab57d1915256beb101c
-
SHA512
fece6154c1f327f8cb51d26a32db89c52ad3e937920a14b4c20d3a265b3e6d57588693f31d4c6fce1a2a9da4b9585521a114dd6f5879f64e94642a87f700eff4
Score
10/10
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/468-59-0x0000000000220000-0x0000000000236000-memory.dmp family_onlylogger behavioral1/memory/468-60-0x0000000000400000-0x00000000004BF000-memory.dmp family_onlylogger -
Legitimate hosting services abused for malware hosting/C2 1 TTPs