General
-
Target
ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600
-
Size
314KB
-
Sample
240524-b23xcagf5x
-
MD5
d1ec6dbbe13ed8451b267702350c12c6
-
SHA1
85137de6a39adaea4593bdeb7145ad55a578b397
-
SHA256
ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600
-
SHA512
cb56c17fc95f7ddc0ec885e992a7dbf1f9d4fa0890cb5d652fff88c6ec13c2f5f681389415edebfefee0d07d8c5d50af242d13887eaa61a9031908d7d790f750
-
SSDEEP
6144:+68xYCR6hv9DonM3v6nNTzXvf0ru+UePpzJfww7TR5Me9a6n:T8xYCS6nxf0r3UqBJJ5TFn
Static task
static1
Behavioral task
behavioral1
Sample
ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600.exe
Resource
win7-20240221-en
Malware Config
Extracted
xehook
2.1.5 Stable
https://ussrconnect.ru/
https://c0nnect1ng.ru/
https://vodkaenjoy.ru/
-
id
108
-
token
xehook108709660
Targets
-
-
Target
ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600
-
Size
314KB
-
MD5
d1ec6dbbe13ed8451b267702350c12c6
-
SHA1
85137de6a39adaea4593bdeb7145ad55a578b397
-
SHA256
ca8c047625f5cf6483de7787327e9728efbc3cdfabff58ca623a2966f5c15600
-
SHA512
cb56c17fc95f7ddc0ec885e992a7dbf1f9d4fa0890cb5d652fff88c6ec13c2f5f681389415edebfefee0d07d8c5d50af242d13887eaa61a9031908d7d790f750
-
SSDEEP
6144:+68xYCR6hv9DonM3v6nNTzXvf0ru+UePpzJfww7TR5Me9a6n:T8xYCS6nxf0r3UqBJJ5TFn
-
Detect Xehook Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-