General
-
Target
b2b_2022-03-20_00-04.exe
-
Size
298KB
-
Sample
220321-dmtq8sggg3
-
MD5
773c9670c70dd5c465ad8e57a39ae55a
-
SHA1
dc117d5ecfdea361e0c31568c3a78714461ad02b
-
SHA256
e6ccc7cc7154361faaf1994b3395a27bb0b8a97f002e28bcdba5e9901793bb00
-
SHA512
265e1d19da3f1a13a25fc2dd6a12cfff484520e1228517d57dfb9cb4ff171bc4d4f986321eba619dbbb77019c714daf1b6bcd7c9dc921ddcee86ef0b25aa2dac
Static task
static1
Behavioral task
behavioral1
Sample
b2b_2022-03-20_00-04.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
b2b_2022-03-20_00-04.exe
Resource
win10v2004-20220310-en
Malware Config
Targets
-
-
Target
b2b_2022-03-20_00-04.exe
-
Size
298KB
-
MD5
773c9670c70dd5c465ad8e57a39ae55a
-
SHA1
dc117d5ecfdea361e0c31568c3a78714461ad02b
-
SHA256
e6ccc7cc7154361faaf1994b3395a27bb0b8a97f002e28bcdba5e9901793bb00
-
SHA512
265e1d19da3f1a13a25fc2dd6a12cfff484520e1228517d57dfb9cb4ff171bc4d4f986321eba619dbbb77019c714daf1b6bcd7c9dc921ddcee86ef0b25aa2dac
Score10/10-
VKeylogger Payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-