Analysis

  • max time kernel
    109s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    15-04-2022 15:14

General

  • Target

    5e75e5f1599859fa86b36ede416b1ce5966db6e420b6c9729101ce4f7117d924.exe

  • Size

    349KB

  • MD5

    178bcec8232631020ce5c7c0787dbaaf

  • SHA1

    c9c73fe7b8f081824c31c4cc7a626ce79b21c036

  • SHA256

    5e75e5f1599859fa86b36ede416b1ce5966db6e420b6c9729101ce4f7117d924

  • SHA512

    bc005fae9269340c3e1e91445cda05e9c1343c39888f5f55d4ea905ea38aa01f55e60e819dbaa160d3dc30dc1ca8a3cfe9c334da23470a3f338e099653bc33da

Score
10/10

Malware Config

Signatures

  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • OnlyLogger Payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5e75e5f1599859fa86b36ede416b1ce5966db6e420b6c9729101ce4f7117d924.exe
    "C:\Users\Admin\AppData\Local\Temp\5e75e5f1599859fa86b36ede416b1ce5966db6e420b6c9729101ce4f7117d924.exe"
    1⤵
      PID:304

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/304-54-0x0000000075DB1000-0x0000000075DB3000-memory.dmp

      Filesize

      8KB

    • memory/304-55-0x0000000000020000-0x000000000003A000-memory.dmp

      Filesize

      104KB

    • memory/304-56-0x0000000000220000-0x000000000024E000-memory.dmp

      Filesize

      184KB

    • memory/304-57-0x0000000000400000-0x00000000004E8000-memory.dmp

      Filesize

      928KB