General
-
Target
9ec869cb94d730926ac5bd94ee0724e5bb8a94eb
-
Size
476KB
-
Sample
210729-dxela58gge
-
MD5
f5bf7345faf95d1997b4db8d72018a62
-
SHA1
9ec869cb94d730926ac5bd94ee0724e5bb8a94eb
-
SHA256
5d3e5503103fe87851128da37f39fdc2e500d7bbf9f69e681745e582db9450a5
-
SHA512
7ad9c11158402a42d6b601cf467b2d0093439d9aae85fc3eab9f5f631ec1398298b2c7b10b9be6a7b88d0f9a41e16e99de1f6403b4dd2f0a4ed64b908b1de302
Static task
static1
Behavioral task
behavioral1
Sample
9ec869cb94d730926ac5bd94ee0724e5bb8a94eb.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
9ec869cb94d730926ac5bd94ee0724e5bb8a94eb.exe
Resource
win10v20210410
Malware Config
Targets
-
-
Target
9ec869cb94d730926ac5bd94ee0724e5bb8a94eb
-
Size
476KB
-
MD5
f5bf7345faf95d1997b4db8d72018a62
-
SHA1
9ec869cb94d730926ac5bd94ee0724e5bb8a94eb
-
SHA256
5d3e5503103fe87851128da37f39fdc2e500d7bbf9f69e681745e582db9450a5
-
SHA512
7ad9c11158402a42d6b601cf467b2d0093439d9aae85fc3eab9f5f631ec1398298b2c7b10b9be6a7b88d0f9a41e16e99de1f6403b4dd2f0a4ed64b908b1de302
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty Payload
-
A310logger Executable
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-