General
-
Target
Autoplay.exe
-
Size
257KB
-
Sample
240430-xrbk1adh21
-
MD5
edafbc9d7eef59cc07d0801e0be9f027
-
SHA1
de3b479d16fbacba44239b0e2eda45367b9ebab1
-
SHA256
6a2048d0dc927b97e9f0dc7b5610d10030958711933d7e980c1151ca841bfd7f
-
SHA512
130b5c9e272ab4674649cdaac7ab1e2d68ce1c391786d95238988304feec9e0f9f659cdae4ec5ff81eb38924238324b67c566deff2c7ceed0e819f13820d0287
-
SSDEEP
6144:fxKQdkTUGJXOjv5o1SDQPd04mhanTqvaGvzUlH07r:5KSkTUGRODePG4mhaXGvMH07r
Static task
static1
Behavioral task
behavioral1
Sample
Autoplay.exe
Resource
win7-20240221-en
Malware Config
Extracted
xehook
https://unotree.ru/
https://aiwhcpoaw.ru/
Targets
-
-
Target
Autoplay.exe
-
Size
257KB
-
MD5
edafbc9d7eef59cc07d0801e0be9f027
-
SHA1
de3b479d16fbacba44239b0e2eda45367b9ebab1
-
SHA256
6a2048d0dc927b97e9f0dc7b5610d10030958711933d7e980c1151ca841bfd7f
-
SHA512
130b5c9e272ab4674649cdaac7ab1e2d68ce1c391786d95238988304feec9e0f9f659cdae4ec5ff81eb38924238324b67c566deff2c7ceed0e819f13820d0287
-
SSDEEP
6144:fxKQdkTUGJXOjv5o1SDQPd04mhanTqvaGvzUlH07r:5KSkTUGRODePG4mhaXGvMH07r
-
Detect Xehook Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-