General
-
Target
imagelogger.exe
-
Size
10.0MB
-
Sample
230719-natktacg76
-
MD5
e661889b752f111ab118d25a45ec8e13
-
SHA1
da81ff57a8fb3368da590e085926e8c32c31d6c3
-
SHA256
1a9a08ca27316ae220e520e888c7a85089e55a384a2d8458f1137e0deb0c97a3
-
SHA512
65839b9eec6eaca987bf6c3f7dab106d89150818691876fa396328dd84c1869ad46196b93af295e8fa0b027ef36da9bff9c1ec37612e71698dd4a992c1a39fa3
-
SSDEEP
98304:DuEtdFBmamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzDgsRuGKCR2CT2cevYAryy48S5:DtFFeN/FJMIDJf/gsAGKCR2CTWYAO5
Static task
static1
Behavioral task
behavioral1
Sample
imagelogger.exe
Resource
win7-20230712-en
Malware Config
Targets
-
-
Target
imagelogger.exe
-
Size
10.0MB
-
MD5
e661889b752f111ab118d25a45ec8e13
-
SHA1
da81ff57a8fb3368da590e085926e8c32c31d6c3
-
SHA256
1a9a08ca27316ae220e520e888c7a85089e55a384a2d8458f1137e0deb0c97a3
-
SHA512
65839b9eec6eaca987bf6c3f7dab106d89150818691876fa396328dd84c1869ad46196b93af295e8fa0b027ef36da9bff9c1ec37612e71698dd4a992c1a39fa3
-
SSDEEP
98304:DuEtdFBmamaHl3Ne4i3gmtfXJOLhx9fZAzDJ4wzDgsRuGKCR2CT2cevYAryy48S5:DtFFeN/FJMIDJf/gsAGKCR2CTWYAO5
Score8/10-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-