General
-
Target
4399c21e668cbe469401638c66ef0519
-
Size
398KB
-
Sample
240105-nvwkxabgd7
-
MD5
4399c21e668cbe469401638c66ef0519
-
SHA1
6caabc0989fb59963f1178de1a528f0f50b7fe33
-
SHA256
dd28e77b8a4352128745bf0a5b8a7df5dc2cfd7b80dd5cb0ea300d95098cccc1
-
SHA512
02d09cd6b09f4ac680bb0d4748e72b347c37e87154c2422d8b879297fd48254608b598bb6b8db8a1258c9571f33f69e7ae791ec1e23682205cf517380d4bf4ff
-
SSDEEP
6144:+/LAKDz4XXXXXXXXXXXXXAWkcDVfe7BKJwhfgJeDs4fTe+dbOQXXXXXXXXXXXXX/:cI7mW4DNxk/w1DBX1
Static task
static1
Behavioral task
behavioral1
Sample
4399c21e668cbe469401638c66ef0519.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4399c21e668cbe469401638c66ef0519.exe
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
4399c21e668cbe469401638c66ef0519
-
Size
398KB
-
MD5
4399c21e668cbe469401638c66ef0519
-
SHA1
6caabc0989fb59963f1178de1a528f0f50b7fe33
-
SHA256
dd28e77b8a4352128745bf0a5b8a7df5dc2cfd7b80dd5cb0ea300d95098cccc1
-
SHA512
02d09cd6b09f4ac680bb0d4748e72b347c37e87154c2422d8b879297fd48254608b598bb6b8db8a1258c9571f33f69e7ae791ec1e23682205cf517380d4bf4ff
-
SSDEEP
6144:+/LAKDz4XXXXXXXXXXXXXAWkcDVfe7BKJwhfgJeDs4fTe+dbOQXXXXXXXXXXXXX/:cI7mW4DNxk/w1DBX1
Score10/10-
A310logger
A310 Logger is a .NET stealer/logger targeting passwords from browsers and email clients.
-
StormKitty payload
-
A310logger Executable
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
Suspicious use of SetThreadContext
-