General
-
Target
f876084f0a4c4921043f0c5d9a300a10.exe
-
Size
295KB
-
Sample
220321-jzz2nsaefp
-
MD5
f876084f0a4c4921043f0c5d9a300a10
-
SHA1
26750325c38616947a66fcf4132afd30bdccbbe6
-
SHA256
04b8f38bffca4122470e8af1b123630809bc7a6fb4e66a3e0a99f82133c9bdf1
-
SHA512
577f59015f58f6a7f6353b183293d834bea07aed8bf970a14888551239c3cca1eb4915ea3768efa697c82a53d33be50eb3a4d279c0ce4a77eb700f8045117587
Static task
static1
Behavioral task
behavioral1
Sample
f876084f0a4c4921043f0c5d9a300a10.exe
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
f876084f0a4c4921043f0c5d9a300a10.exe
Resource
win10v2004-20220310-en
Malware Config
Targets
-
-
Target
f876084f0a4c4921043f0c5d9a300a10.exe
-
Size
295KB
-
MD5
f876084f0a4c4921043f0c5d9a300a10
-
SHA1
26750325c38616947a66fcf4132afd30bdccbbe6
-
SHA256
04b8f38bffca4122470e8af1b123630809bc7a6fb4e66a3e0a99f82133c9bdf1
-
SHA512
577f59015f58f6a7f6353b183293d834bea07aed8bf970a14888551239c3cca1eb4915ea3768efa697c82a53d33be50eb3a4d279c0ce4a77eb700f8045117587
Score10/10-
VKeylogger Payload
-
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
suricata: ET MALWARE Generic -POST To gate.php w/Extended ASCII Characters (Likely Zeus Derivative)
-
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
suricata: ET MALWARE Generic Request to gate.php Dotted-Quad
-
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
suricata: ET MALWARE Single char EXE direct download likely trojan (multiple families)
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
suricata: ET MALWARE Win32/Spy.Agent.QAQ Variant CnC Activity
suricata: ET MALWARE Win32/Spy.Agent.QAQ Variant CnC Activity
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-