Analysis

  • max time kernel
    122s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-01-2025 05:38

General

  • Target

    hoodz/hoodz logger.exe

  • Size

    743KB

  • MD5

    7177b0ba961ddd258ee9672d436d6b63

  • SHA1

    cdb7aef7f7a05430d323c00d43fe98af4680fa28

  • SHA256

    1abcde09d85b8ff8788f23afaf33674557563273df5961719bc65216aa3a1a95

  • SHA512

    df1b07f5d4ff53afc4547fb371af1393bafce2eec0cc96ab0ceeaeb4500a3e771f4d1b9c7936b86f38241abfdfb53c9cf2fff22d3a0e7006015f50c165c59078

  • SSDEEP

    12288:RoA2sfoKrzzpKnToLX5y8anwFgBGOXtoTmDr1aVupsZTDfCc71FT/mI69puLam6q:n2sg0z2ToE8+Q8tpDr10fCETZ6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\hoodz\hoodz logger.exe
    "C:\Users\Admin\AppData\Local\Temp\hoodz\hoodz logger.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2868

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\gdi32.dll

    Filesize

    431KB

    MD5

    64c287959ff0dbd10db81bded030a3a1

    SHA1

    acf88011455fc98d0de186520b4ddde5d1cf5f75

    SHA256

    673e0efee492a6a82afcce12545c4a2d46a1e9e827c33b7a1e9f0a904656a458

    SHA512

    d7ca03f8032e7c9d5882ead046c33388d5ebba5923abd95c3c535945ba4aa8a1fe6e47d116dd9376c6717a36bff5ac0d0dcfc599526a5fc89d81c3fd3b0517c2

  • memory/2868-8-0x0000000074B40000-0x000000007522E000-memory.dmp

    Filesize

    6.9MB

  • memory/2868-7-0x00000000757A0000-0x0000000075861000-memory.dmp

    Filesize

    772KB

  • memory/2868-2-0x00000000004D0000-0x00000000004D6000-memory.dmp

    Filesize

    24KB

  • memory/2868-1-0x00000000000F0000-0x00000000001B2000-memory.dmp

    Filesize

    776KB

  • memory/2868-0-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

    Filesize

    4KB