General
-
Target
00900090KN.zip
-
Size
388KB
-
Sample
210831-4vyxz8xbfe
-
MD5
3cb44a3d7b5297101d313a11e38eeef6
-
SHA1
1a370a78945cf635f40aed3cd6a32fbb6aa25dd5
-
SHA256
87c44dc08a84f171306e12a0c94547cf9540d782c7c5461a0815067a2ab0e130
-
SHA512
f886ed0ef98be670e4b5e0c46a2b1d01bb365ef657b65b3633fc36e3a498e1bce4f5d89a01f0b1c5dc972adeca173abf25177931077b138dc8e490dd78250dd1
Static task
static1
Behavioral task
behavioral1
Sample
00900090KN.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
00900090KN.exe
Resource
win10v20210408
Malware Config
Targets
-
-
Target
00900090KN.exe
-
Size
529KB
-
MD5
aaf17abfdde05c49c802f36152e7332f
-
SHA1
96cb10637d94c28163b390d11a43a2ece002d5f0
-
SHA256
16c87c40706e8c0eee97f32fccac2fa229961b13d266e011ce411d37b864dafa
-
SHA512
d93fe97db4fe0ba40fc53996e01c3f72e184f3646d630064ba23f718c1f3e7e8bad78078772924147262551e8ab686ac3ef46af98ccb39cd68f1c98f82f4f5b3
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty Payload
-
A310logger Executable
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-