General
-
Target
DC9087009000.exe
-
Size
564KB
-
Sample
210904-hvyglsdhh7
-
MD5
1a38c8b2bd82b0c0efd9bcdd6a02d5c8
-
SHA1
6ce1c0fb181c34931809ceac48d36c7c2b40e769
-
SHA256
99725d77056555125ea584b0ea92984abdb963950773181c61808a45ab3905a4
-
SHA512
0b29c653c15552ee2dde3e3acae1397f8642d4f26d635b9d3f5b25e1aafb25d6df1f78053d5cbc4ebf43c0ffda6f1ef2e8f0b367e0480dec5bcfc2c2a409ae7a
Static task
static1
Behavioral task
behavioral1
Sample
DC9087009000.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
DC9087009000.exe
Resource
win10-en
Malware Config
Targets
-
-
Target
DC9087009000.exe
-
Size
564KB
-
MD5
1a38c8b2bd82b0c0efd9bcdd6a02d5c8
-
SHA1
6ce1c0fb181c34931809ceac48d36c7c2b40e769
-
SHA256
99725d77056555125ea584b0ea92984abdb963950773181c61808a45ab3905a4
-
SHA512
0b29c653c15552ee2dde3e3acae1397f8642d4f26d635b9d3f5b25e1aafb25d6df1f78053d5cbc4ebf43c0ffda6f1ef2e8f0b367e0480dec5bcfc2c2a409ae7a
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty Payload
-
A310logger Executable
-
Executes dropped EXE
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-