General
-
Target
6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e
-
Size
291KB
-
Sample
220725-fshbhafgh7
-
MD5
471c1bfe49a45efdbd925956ef79b18a
-
SHA1
4891a1b912848c5990ceabd7cfb815df4d7ee6ab
-
SHA256
6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e
-
SHA512
58db68688cd70eb7d4646d6f31b618525b3c5bb282955d530ab023e18ebefd0d0f6be397f0c0866ae7d8c93e30c57a8ea6ffd7f60ccb94c470f13babae0100c3
Static task
static1
Behavioral task
behavioral1
Sample
6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e.exe
Resource
win10v2004-20220722-en
Malware Config
Targets
-
-
Target
6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e
-
Size
291KB
-
MD5
471c1bfe49a45efdbd925956ef79b18a
-
SHA1
4891a1b912848c5990ceabd7cfb815df4d7ee6ab
-
SHA256
6f114eb67f2957867f449185493502e761dac3bf42afec7fcea2a1f49135b83e
-
SHA512
58db68688cd70eb7d4646d6f31b618525b3c5bb282955d530ab023e18ebefd0d0f6be397f0c0866ae7d8c93e30c57a8ea6ffd7f60ccb94c470f13babae0100c3
-
404 Keylogger Main Executable
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-