Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 05:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
a2f5ec3308212deca402cc142b9abf99.exe
Resource
win7-20240221-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
a2f5ec3308212deca402cc142b9abf99.exe
Resource
win10v2004-20240221-en
3 signatures
150 seconds
General
-
Target
a2f5ec3308212deca402cc142b9abf99.exe
-
Size
365KB
-
MD5
a2f5ec3308212deca402cc142b9abf99
-
SHA1
09d9ec17ea12adf3cd9fde172de038ab923ecd89
-
SHA256
d00d061df7e1755564365a54aca6f255d58d58be7791465c0a07bd3033e1a223
-
SHA512
9ca4a5457913239c951b4b838c913df19b54e259ae43d763fd60cb32581d877727b15bee7a40697bba4052de5605a8b8b03309acc6fb4804e3163647254e3901
-
SSDEEP
6144:2TLiQ9OX7t6rnqbkVCqtcZJEfC4uBYCxIanX59EPCmK:kdOfk5Kl4uBiaX59Y
Score
10/10
Malware Config
Extracted
Family
gcleaner
C2
194.145.227.161
Signatures
-
OnlyLogger
A tiny loader that uses IPLogger to get its payload.
-
OnlyLogger payload 4 IoCs
resource yara_rule behavioral2/memory/3808-2-0x0000000003EC0000-0x0000000003EEF000-memory.dmp family_onlylogger behavioral2/memory/3808-3-0x0000000000400000-0x000000000217A000-memory.dmp family_onlylogger behavioral2/memory/3808-4-0x0000000000400000-0x000000000217A000-memory.dmp family_onlylogger behavioral2/memory/3808-8-0x0000000003EC0000-0x0000000003EEF000-memory.dmp family_onlylogger