General
-
Target
ced11cfdf5fe272660ba907fa8733c3054787c9215c514421035c22617c4fe77
-
Size
1.2MB
-
Sample
220701-dmpsaabch5
-
MD5
fc3fc7632950b12995b35f96eb6e09d1
-
SHA1
b111084113f7b9aba6c0f8f3cb03f1972c7433aa
-
SHA256
ced11cfdf5fe272660ba907fa8733c3054787c9215c514421035c22617c4fe77
-
SHA512
18b6ef3a6ce18972034805fe7cbc62c802335b2dc909d9ecf54c7e36c9f6707d3a5b862768a7a15e7c58529d42168f165e0f82398148dba3922adf724f9bda9c
Static task
static1
Behavioral task
behavioral1
Sample
ced11cfdf5fe272660ba907fa8733c3054787c9215c514421035c22617c4fe77.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
ced11cfdf5fe272660ba907fa8733c3054787c9215c514421035c22617c4fe77.exe
Resource
win10v2004-20220414-en
Malware Config
Targets
-
-
Target
ced11cfdf5fe272660ba907fa8733c3054787c9215c514421035c22617c4fe77
-
Size
1.2MB
-
MD5
fc3fc7632950b12995b35f96eb6e09d1
-
SHA1
b111084113f7b9aba6c0f8f3cb03f1972c7433aa
-
SHA256
ced11cfdf5fe272660ba907fa8733c3054787c9215c514421035c22617c4fe77
-
SHA512
18b6ef3a6ce18972034805fe7cbc62c802335b2dc909d9ecf54c7e36c9f6707d3a5b862768a7a15e7c58529d42168f165e0f82398148dba3922adf724f9bda9c
Score10/10-
404 Keylogger Main Executable
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-