General
-
Target
1dbe4ba8f382a47c48facfd9360fac10.exe
-
Size
353KB
-
Sample
240706-aftk4ssdkf
-
MD5
1dbe4ba8f382a47c48facfd9360fac10
-
SHA1
08b5c20e80e71abfaa842697a1e9ed3ee76feeee
-
SHA256
b9e5ab4620dc672f82c5d9d32459fd7a6a13960be269d8b13b8b4b6a1a33cf66
-
SHA512
8920aff361ff91c18a08b16076215c30f4fc7c8ffd0de9fa822698c66165324545a20103d971f5e093c147cd5987d85ad9fb64969eba4ea67fc728641b13e992
-
SSDEEP
6144:3YidRQfaVJpx3VZiYbEhYPQTEy/gbs4z5OOhChUU3V8i84hx7SJuV5erUuiLEO:3RaaVJpxb0wyKsK5xhdiJScXeLiLEO
Static task
static1
Behavioral task
behavioral1
Sample
1dbe4ba8f382a47c48facfd9360fac10.exe
Resource
win7-20240220-en
Malware Config
Extracted
xehook
2.1.5 Stable
https://ussrconnect.ru/
https://c0nnect1ng.ru/
https://vodkaenjoy.ru/
-
id
174
-
token
xehook174464555
Targets
-
-
Target
1dbe4ba8f382a47c48facfd9360fac10.exe
-
Size
353KB
-
MD5
1dbe4ba8f382a47c48facfd9360fac10
-
SHA1
08b5c20e80e71abfaa842697a1e9ed3ee76feeee
-
SHA256
b9e5ab4620dc672f82c5d9d32459fd7a6a13960be269d8b13b8b4b6a1a33cf66
-
SHA512
8920aff361ff91c18a08b16076215c30f4fc7c8ffd0de9fa822698c66165324545a20103d971f5e093c147cd5987d85ad9fb64969eba4ea67fc728641b13e992
-
SSDEEP
6144:3YidRQfaVJpx3VZiYbEhYPQTEy/gbs4z5OOhChUU3V8i84hx7SJuV5erUuiLEO:3RaaVJpxb0wyKsK5xhdiJScXeLiLEO
-
Detect Xehook Payload
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-