General
-
Target
85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d
-
Size
332KB
-
Sample
220724-z7v1paggh9
-
MD5
173ec773d0b146dfb249629550901ded
-
SHA1
7bfa3586a135f95dba15b00385d8eec2f838d2be
-
SHA256
85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d
-
SHA512
a2a82ce38c42faa77acf038fecc7c95c1729d5d49ccbd6eb36e24d5f61c0435c633ba217cbde54df02623dc0092e4555c14b809ba0095d74a88ee123b956480f
Static task
static1
Behavioral task
behavioral1
Sample
85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d.exe
Resource
win10v2004-20220721-en
Malware Config
Targets
-
-
Target
85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d
-
Size
332KB
-
MD5
173ec773d0b146dfb249629550901ded
-
SHA1
7bfa3586a135f95dba15b00385d8eec2f838d2be
-
SHA256
85e6b8d717a4665d3e698c5c262e702daea50d296da35fdf6ca0c58ff5a71b5d
-
SHA512
a2a82ce38c42faa77acf038fecc7c95c1729d5d49ccbd6eb36e24d5f61c0435c633ba217cbde54df02623dc0092e4555c14b809ba0095d74a88ee123b956480f
-
404 Keylogger Main Executable
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-