General
-
Target
96739a4d394217c2cbd895cf16acc0c8
-
Size
455KB
-
Sample
231226-3kam1sebcl
-
MD5
96739a4d394217c2cbd895cf16acc0c8
-
SHA1
90af83fed1eb2652e133aad4f47f9354287f75a8
-
SHA256
28fe91c48fa8583da9692cbdee3c2c32038d5dc3f8ca7dcd195f74511c1d6a78
-
SHA512
846383b8cd6ff5208c96bf2063faff5c2fa1c1d5d714c11cb30d9aa84ad56f2435f70b2446cfc7006920a4b71dfc568bb36e03d5e8d077db757e673307729955
-
SSDEEP
6144:FpJ+LBFdhgY3AgXUU6EEsgg/nzzYjzZnMUzpVltygvxTUpVP/KW+q9UT95GX:vArdGPqSENgg/KRpT/vxUpMLR5k
Static task
static1
Behavioral task
behavioral1
Sample
96739a4d394217c2cbd895cf16acc0c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96739a4d394217c2cbd895cf16acc0c8.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
96739a4d394217c2cbd895cf16acc0c8
-
Size
455KB
-
MD5
96739a4d394217c2cbd895cf16acc0c8
-
SHA1
90af83fed1eb2652e133aad4f47f9354287f75a8
-
SHA256
28fe91c48fa8583da9692cbdee3c2c32038d5dc3f8ca7dcd195f74511c1d6a78
-
SHA512
846383b8cd6ff5208c96bf2063faff5c2fa1c1d5d714c11cb30d9aa84ad56f2435f70b2446cfc7006920a4b71dfc568bb36e03d5e8d077db757e673307729955
-
SSDEEP
6144:FpJ+LBFdhgY3AgXUU6EEsgg/nzzYjzZnMUzpVltygvxTUpVP/KW+q9UT95GX:vArdGPqSENgg/KRpT/vxUpMLR5k
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty payload
-
A310logger Executable
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-