Analysis
-
max time kernel
110s -
max time network
120s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-11-2021 15:54
Static task
static1
Behavioral task
behavioral1
Sample
974b5b880750b82e0be5e6d3d6a0fce8.exe
Resource
win7-en-20211104
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
974b5b880750b82e0be5e6d3d6a0fce8.exe
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
974b5b880750b82e0be5e6d3d6a0fce8.exe
-
Size
338KB
-
MD5
974b5b880750b82e0be5e6d3d6a0fce8
-
SHA1
59f5c934651660638e0f4db08e61208989eb7529
-
SHA256
301559f3ba75f3be51e18406fc9fd0e27b04dc4ceeb4fbd719b67a361b2967d5
-
SHA512
df9d08b1f66b0caaf70dc466e803e252760c04068e130bdf181ac6c645b88e5101cf8d61c5ec4cc552518ec8b9a0195e4fa7f58aee8f91b6de1fa75790890bba
Score
10/10
Malware Config
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3112-116-0x00000000001C0000-0x00000000001D6000-memory.dmp family_onlylogger behavioral2/memory/3112-117-0x0000000000400000-0x0000000002B4E000-memory.dmp family_onlylogger -
Legitimate hosting services abused for malware hosting/C2 1 TTPs