General

  • Target

    4736-2-0x0000000000400000-0x000000000042C000-memory.dmp

  • Size

    176KB

  • Sample

    240806-kkpg3avcrm

  • MD5

    e44d5af0dd605315fbae2ae479410e15

  • SHA1

    7c877d8f82ca3308ccf5f18534cf52a08ad65808

  • SHA256

    87f8ee2b5e61849bd27020d39fda3773ef32a1d1db0da985d140df9fef46280c

  • SHA512

    20f869211de41f9db6facd356bc029b33c45980dd5d13612c69bdb5bee42695935914210e3b52003250a6200c3baa4c6ff5ac821ede41cab398bee2fb99a11c1

  • SSDEEP

    3072:tcickyglTPyn/a4ud65snkSeHTt74EHFdMWKwEKptHSwQP:q/MhnkSeHTt74EHFdMWrEKDh

Score
10/10

Malware Config

Extracted

Family

xehook

Version

2.1.5 Stable

C2

https://ussrconnect.ru/

https://c0nnect1ng.ru/

https://vodkaenjoy.ru/

Attributes
  • id

    108

  • token

    xehook108709660

Targets

    • Target

      4736-2-0x0000000000400000-0x000000000042C000-memory.dmp

    • Size

      176KB

    • MD5

      e44d5af0dd605315fbae2ae479410e15

    • SHA1

      7c877d8f82ca3308ccf5f18534cf52a08ad65808

    • SHA256

      87f8ee2b5e61849bd27020d39fda3773ef32a1d1db0da985d140df9fef46280c

    • SHA512

      20f869211de41f9db6facd356bc029b33c45980dd5d13612c69bdb5bee42695935914210e3b52003250a6200c3baa4c6ff5ac821ede41cab398bee2fb99a11c1

    • SSDEEP

      3072:tcickyglTPyn/a4ud65snkSeHTt74EHFdMWKwEKptHSwQP:q/MhnkSeHTt74EHFdMWrEKDh

    Score
    1/10

MITRE ATT&CK Matrix

Tasks