General
-
Target
2c719ad6ae08ca72c969acb4bf29d737
-
Size
225KB
-
Sample
231231-hq759abagm
-
MD5
2c719ad6ae08ca72c969acb4bf29d737
-
SHA1
80c4b9c3b6c4616741dc62937dc8bef387899cf7
-
SHA256
900cdeb724906bfb89cb37b1a8917097b47da2d0aa4143e421f3a194455a4684
-
SHA512
227a740d9785af7a7a08aa9ad4574872f8c58813f4099cb39c7ad3478754e003dfcb0079f6a61f65ef087717b2e939a7351c5d6a6a1e7b9cdb83daf5f280f1ff
-
SSDEEP
6144:yJXxo77777777777770TFaoUt+cfRsLeWsJavh477gVV777777777777777777Io:yBm77777777777770TFUxfRsLeW4aGE9
Static task
static1
Behavioral task
behavioral1
Sample
2c719ad6ae08ca72c969acb4bf29d737.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2c719ad6ae08ca72c969acb4bf29d737.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
2c719ad6ae08ca72c969acb4bf29d737
-
Size
225KB
-
MD5
2c719ad6ae08ca72c969acb4bf29d737
-
SHA1
80c4b9c3b6c4616741dc62937dc8bef387899cf7
-
SHA256
900cdeb724906bfb89cb37b1a8917097b47da2d0aa4143e421f3a194455a4684
-
SHA512
227a740d9785af7a7a08aa9ad4574872f8c58813f4099cb39c7ad3478754e003dfcb0079f6a61f65ef087717b2e939a7351c5d6a6a1e7b9cdb83daf5f280f1ff
-
SSDEEP
6144:yJXxo77777777777770TFaoUt+cfRsLeWsJavh477gVV777777777777777777Io:yBm77777777777770TFUxfRsLeW4aGE9
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty payload
-
A310logger Executable
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-