General
-
Target
1fa095732c97b5ed364f985d412e083b6e9b213ca5487f03c5c0e70e07b59692
-
Size
4.8MB
-
Sample
220330-j5jlwaefgk
-
MD5
dce2367e077d94b44f4ba332300820a9
-
SHA1
d901f88c286eb4c46bd995a8c08c415ec7d5eb93
-
SHA256
1fa095732c97b5ed364f985d412e083b6e9b213ca5487f03c5c0e70e07b59692
-
SHA512
a094ae52cf55dace4da04b68225fabb949d8533ae94f6412798367ee1ad59e5ed90e9b20fc16cb749855d7b9d8a66affbef24c4477e6a0bda7aef1f279a5fbcb
Static task
static1
Behavioral task
behavioral1
Sample
1fa095732c97b5ed364f985d412e083b6e9b213ca5487f03c5c0e70e07b59692.exe
Resource
win7-20220331-en
Malware Config
Targets
-
-
Target
1fa095732c97b5ed364f985d412e083b6e9b213ca5487f03c5c0e70e07b59692
-
Size
4.8MB
-
MD5
dce2367e077d94b44f4ba332300820a9
-
SHA1
d901f88c286eb4c46bd995a8c08c415ec7d5eb93
-
SHA256
1fa095732c97b5ed364f985d412e083b6e9b213ca5487f03c5c0e70e07b59692
-
SHA512
a094ae52cf55dace4da04b68225fabb949d8533ae94f6412798367ee1ad59e5ed90e9b20fc16cb749855d7b9d8a66affbef24c4477e6a0bda7aef1f279a5fbcb
-
Poullight Stealer Payload
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
suricata: ET MALWARE Trojan Generic - POST To gate.php with no accept headers
-
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
suricata: ET MALWARE Trojan Generic - POST To gate.php with no referer
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-