General
-
Target
86956574d8364f5e6062a23189458eb2.exe
-
Size
276KB
-
Sample
240419-yh3tkaee7x
-
MD5
86956574d8364f5e6062a23189458eb2
-
SHA1
9d0cd1bb0b618ffe9076e7ad5e607ea88abe85b0
-
SHA256
05bfbb0886bf381e6a4b2875e928aedf6abe197884d9a64ad7137f6016ed5c9f
-
SHA512
d206d519fe82cd025f0ace27759c6e99559187f7bd84dd61eadf06b0acf6f3ed6b289f650c163debe9afc38ec62cad51479c4b2e3ab3a0ab71132c5557064305
-
SSDEEP
6144:9g4e6XnYIZxmt5DmvpVYNB/nOCFDfuOTJ6I2vCoCe:a4XnYeuNN5J2OTLoCe
Static task
static1
Behavioral task
behavioral1
Sample
86956574d8364f5e6062a23189458eb2.exe
Resource
win7-20240220-en
Malware Config
Extracted
xehook
https://unotree.ru/
https://aiwhcpoaw.ru/
Targets
-
-
Target
86956574d8364f5e6062a23189458eb2.exe
-
Size
276KB
-
MD5
86956574d8364f5e6062a23189458eb2
-
SHA1
9d0cd1bb0b618ffe9076e7ad5e607ea88abe85b0
-
SHA256
05bfbb0886bf381e6a4b2875e928aedf6abe197884d9a64ad7137f6016ed5c9f
-
SHA512
d206d519fe82cd025f0ace27759c6e99559187f7bd84dd61eadf06b0acf6f3ed6b289f650c163debe9afc38ec62cad51479c4b2e3ab3a0ab71132c5557064305
-
SSDEEP
6144:9g4e6XnYIZxmt5DmvpVYNB/nOCFDfuOTJ6I2vCoCe:a4XnYeuNN5J2OTLoCe
-
Detect Xehook Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-