General
-
Target
734045009f0b155db1692141832332bb4fdc4511399a67a5e22835a2b72fc7bd
-
Size
245KB
-
Sample
211214-yy1ddagcg6
-
MD5
b0e4ad8a749f5a154420e5f6d3eadbe0
-
SHA1
d9597f8e4d1b35acf9fed9622548946b83947bda
-
SHA256
734045009f0b155db1692141832332bb4fdc4511399a67a5e22835a2b72fc7bd
-
SHA512
dde672033bf3d426a6cedcb774bdca7815f3afab8fcdf8dc93016d3362c85a2e0134505747b96bab2e729533e91add660165aa3de106a5e701f2dbda2b0c8071
Static task
static1
Behavioral task
behavioral1
Sample
734045009f0b155db1692141832332bb4fdc4511399a67a5e22835a2b72fc7bd.exe
Resource
win10-en-20211208
Malware Config
Targets
-
-
Target
734045009f0b155db1692141832332bb4fdc4511399a67a5e22835a2b72fc7bd
-
Size
245KB
-
MD5
b0e4ad8a749f5a154420e5f6d3eadbe0
-
SHA1
d9597f8e4d1b35acf9fed9622548946b83947bda
-
SHA256
734045009f0b155db1692141832332bb4fdc4511399a67a5e22835a2b72fc7bd
-
SHA512
dde672033bf3d426a6cedcb774bdca7815f3afab8fcdf8dc93016d3362c85a2e0134505747b96bab2e729533e91add660165aa3de106a5e701f2dbda2b0c8071
Score10/10-
Modifies WinLogon for persistence
-
VKeylogger Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-