General
-
Target
1988e57588055c5e70ba3acc057888a03d33520ae86f74f95e6c2a9bcbf128aa
-
Size
273KB
-
Sample
240422-fhspgsga5w
-
MD5
09b7c724534548986bb2110cf0902d76
-
SHA1
b94ad55a4b7c4c2c9d5a85c3426bbd8a54bfbcc8
-
SHA256
1988e57588055c5e70ba3acc057888a03d33520ae86f74f95e6c2a9bcbf128aa
-
SHA512
42ff115546983093708a43909f1bf962741ab7ceca55b86892f4e85bd3b6071ef2bddadd8f0a51a4684c11f2fca988e58a26ad6567820990a3c243670182ea5f
-
SSDEEP
6144:VtwlK8rGFkFokzeQanr/6pNLCI8cQGz0nUMtY/uqqaO0:B8rGFkFP2upVC+zqUMtY/uq/O0
Static task
static1
Behavioral task
behavioral1
Sample
1988e57588055c5e70ba3acc057888a03d33520ae86f74f95e6c2a9bcbf128aa.exe
Resource
win7-20240221-en
Malware Config
Extracted
xehook
https://unotree.ru/
https://aiwhcpoaw.ru/
Targets
-
-
Target
1988e57588055c5e70ba3acc057888a03d33520ae86f74f95e6c2a9bcbf128aa
-
Size
273KB
-
MD5
09b7c724534548986bb2110cf0902d76
-
SHA1
b94ad55a4b7c4c2c9d5a85c3426bbd8a54bfbcc8
-
SHA256
1988e57588055c5e70ba3acc057888a03d33520ae86f74f95e6c2a9bcbf128aa
-
SHA512
42ff115546983093708a43909f1bf962741ab7ceca55b86892f4e85bd3b6071ef2bddadd8f0a51a4684c11f2fca988e58a26ad6567820990a3c243670182ea5f
-
SSDEEP
6144:VtwlK8rGFkFokzeQanr/6pNLCI8cQGz0nUMtY/uqqaO0:B8rGFkFP2upVC+zqUMtY/uq/O0
-
Detect Xehook Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-