General
-
Target
2.exe
-
Size
2.7MB
-
Sample
210822-wclrj37lyj
-
MD5
37798198d3649f8171286118fd320fe2
-
SHA1
e4d54a7c1dec833f20a6ff922388bac3b0a8546f
-
SHA256
04e942767c6c9744ef7eb6d3cc342239b8feaacd4df3c5e542b85177c0fbd97f
-
SHA512
04f6b778a1920686a8c831be6a827df8997c70b5f2148470142748388d8719f78c553ca462000323bc96c9dc0443addaed636687743ed6df159bab3e90e45838
Static task
static1
Behavioral task
behavioral1
Sample
2.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
2.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
2.exe
-
Size
2.7MB
-
MD5
37798198d3649f8171286118fd320fe2
-
SHA1
e4d54a7c1dec833f20a6ff922388bac3b0a8546f
-
SHA256
04e942767c6c9744ef7eb6d3cc342239b8feaacd4df3c5e542b85177c0fbd97f
-
SHA512
04f6b778a1920686a8c831be6a827df8997c70b5f2148470142748388d8719f78c553ca462000323bc96c9dc0443addaed636687743ed6df159bab3e90e45838
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty Payload
-
A310logger Executable
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-