General
-
Target
SecuriteInfo.com.W32.AIDetectNet.01.18479.7322
-
Size
600KB
-
Sample
220517-ktvqfacceq
-
MD5
4ffb6091ba5ec0d9ca7bd79107ca6fae
-
SHA1
5eaf10eec6cbbace9fa89f191c8d95a477041067
-
SHA256
b990b5f072914cba8f10f88932ce5be9feff9760f7a1a20d562f885915ca9423
-
SHA512
7bf47313d95604c64d5a0424cc5b7cac79d8200bf7ffa6d604e07a98c88365d5bcee82fef4f13d04265c9652823479d9add0dbc4bb2d8a8803054800d3b184a9
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.W32.AIDetectNet.01.18479.exe
Resource
win7-20220414-en
Malware Config
Extracted
oski
unitech.co.vu
Targets
-
-
Target
SecuriteInfo.com.W32.AIDetectNet.01.18479.7322
-
Size
600KB
-
MD5
4ffb6091ba5ec0d9ca7bd79107ca6fae
-
SHA1
5eaf10eec6cbbace9fa89f191c8d95a477041067
-
SHA256
b990b5f072914cba8f10f88932ce5be9feff9760f7a1a20d562f885915ca9423
-
SHA512
7bf47313d95604c64d5a0424cc5b7cac79d8200bf7ffa6d604e07a98c88365d5bcee82fef4f13d04265c9652823479d9add0dbc4bb2d8a8803054800d3b184a9
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt)
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (Passwords.txt) M2
-
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
suricata: ET MALWARE Suspicious Zipped Filename in Outbound POST Request (passwords.txt) M2
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer Data Exfil
-
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
suricata: ET MALWARE Vidar/Arkei/Megumin/Oski Stealer HTTP POST Pattern
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-