General
-
Target
aa589381220413a2f4ab55a90e40a24fd9dba83f037f764e86a8d1a939f043a9
-
Size
566KB
-
Sample
220731-kts7lsghf9
-
MD5
2e6a65be958f5ecda11b983c7f8767a5
-
SHA1
c3027e506cb1e0563a8229a5c64b0f51f68dc08e
-
SHA256
aa589381220413a2f4ab55a90e40a24fd9dba83f037f764e86a8d1a939f043a9
-
SHA512
309569b1250ea57d831f419dbd4f733ecc14f81d613f5b19e24dd598ae426d146696416645a09b652d80a375a220c0ba4f30d6e91ef3673a44441c23659c6e48
Static task
static1
Behavioral task
behavioral1
Sample
aa589381220413a2f4ab55a90e40a24fd9dba83f037f764e86a8d1a939f043a9.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
aa589381220413a2f4ab55a90e40a24fd9dba83f037f764e86a8d1a939f043a9.exe
Resource
win10v2004-20220721-en
Malware Config
Extracted
Protocol: smtp- Host:
us2.smtp.mailhostbox.com - Port:
587 - Username:
[email protected] - Password:
payment12345
Targets
-
-
Target
aa589381220413a2f4ab55a90e40a24fd9dba83f037f764e86a8d1a939f043a9
-
Size
566KB
-
MD5
2e6a65be958f5ecda11b983c7f8767a5
-
SHA1
c3027e506cb1e0563a8229a5c64b0f51f68dc08e
-
SHA256
aa589381220413a2f4ab55a90e40a24fd9dba83f037f764e86a8d1a939f043a9
-
SHA512
309569b1250ea57d831f419dbd4f733ecc14f81d613f5b19e24dd598ae426d146696416645a09b652d80a375a220c0ba4f30d6e91ef3673a44441c23659c6e48
Score10/10-
404 Keylogger Main Executable
-
Drops startup file
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-