Analysis

  • max time kernel
    43s
  • max time network
    48s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-07-2022 08:25

General

  • Target

    46e2db7081cfa3a19b4c740c103ca3db02234c1aa5c4addf15ae2a09ab7a99fb.exe

  • Size

    301KB

  • MD5

    6a7fa81b5d9147c23b0ba79e6e715fd1

  • SHA1

    b2b7f2ef21e255b81ebf09fb0ffe077edec059b7

  • SHA256

    46e2db7081cfa3a19b4c740c103ca3db02234c1aa5c4addf15ae2a09ab7a99fb

  • SHA512

    0da996b9c356d5a0cb3ac0b2fdb7e3511b46eb1840664cc8ab87a9cb23f721d6ee2580f24392f87093704c25ae0c851e7e4ff86c539403a4f0e050cf5f8c1690

Score
10/10

Malware Config

Signatures

  • OnlyLogger

    A tiny loader that uses IPLogger to get its payload.

  • OnlyLogger payload 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46e2db7081cfa3a19b4c740c103ca3db02234c1aa5c4addf15ae2a09ab7a99fb.exe
    "C:\Users\Admin\AppData\Local\Temp\46e2db7081cfa3a19b4c740c103ca3db02234c1aa5c4addf15ae2a09ab7a99fb.exe"
    1⤵
      PID:2008

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2008-54-0x0000000075DB1000-0x0000000075DB3000-memory.dmp

      Filesize

      8KB

    • memory/2008-56-0x0000000000310000-0x0000000000354000-memory.dmp

      Filesize

      272KB

    • memory/2008-57-0x0000000000400000-0x0000000000456000-memory.dmp

      Filesize

      344KB

    • memory/2008-55-0x0000000000220000-0x0000000000247000-memory.dmp

      Filesize

      156KB