General
-
Target
98f915073ebb14e0302f0e75c58e884c8a1ff16647105dcc6efc8606bbe214da
-
Size
227KB
-
Sample
241007-2kgkwswgjp
-
MD5
a9ac04a4a30fcf7f57fa94e6bff411fe
-
SHA1
4c44ef0ec8e8a8d74497d4548f07ff86d6d8426d
-
SHA256
98f915073ebb14e0302f0e75c58e884c8a1ff16647105dcc6efc8606bbe214da
-
SHA512
ab757b0698a72403fbf95612ed28aff4df090590f6121d20cc321931d196af4d8602994b6fb2bff876406fb69c917b2bb936d82fa56b1ebbb4a1e253a0bfa523
-
SSDEEP
6144:5nllcE8uegM8zBQC/KGKAQ4lOjoegzGXgrshUN8:5agl2C/KGK4lNegzGXgrshUN8
Static task
static1
Behavioral task
behavioral1
Sample
98f915073ebb14e0302f0e75c58e884c8a1ff16647105dcc6efc8606bbe214da.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
98f915073ebb14e0302f0e75c58e884c8a1ff16647105dcc6efc8606bbe214da.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
xehook
2.1.5 Stable
https://t.me/+w897k5UK_jIyNDgy
-
id
376
-
token
xehook376672216898165
Targets
-
-
Target
98f915073ebb14e0302f0e75c58e884c8a1ff16647105dcc6efc8606bbe214da
-
Size
227KB
-
MD5
a9ac04a4a30fcf7f57fa94e6bff411fe
-
SHA1
4c44ef0ec8e8a8d74497d4548f07ff86d6d8426d
-
SHA256
98f915073ebb14e0302f0e75c58e884c8a1ff16647105dcc6efc8606bbe214da
-
SHA512
ab757b0698a72403fbf95612ed28aff4df090590f6121d20cc321931d196af4d8602994b6fb2bff876406fb69c917b2bb936d82fa56b1ebbb4a1e253a0bfa523
-
SSDEEP
6144:5nllcE8uegM8zBQC/KGKAQ4lOjoegzGXgrshUN8:5agl2C/KGK4lNegzGXgrshUN8
Score10/10-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-