General
-
Target
ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe
-
Size
784KB
-
Sample
210325-ltl31c3mes
-
MD5
1d963f2296c5363f16dff1165cb8e413
-
SHA1
15f699a8a754a937081a27ab75d4a793b82993e6
-
SHA256
ed8a7ffec56f450a365e758012db092883bbd23565f3f9fbb004c189fb703de3
-
SHA512
a76bf1f1398800ee0a09088d42dc38ce2d42b66e24a8cb4c97f1c055702483193467b562740c808106fa813614425304993f16e9a101e1e8202deec4ef65e2be
Static task
static1
Behavioral task
behavioral1
Sample
ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
ed8a7ffec56f450a365e758012db092883bbd23565f3f.exe
-
Size
784KB
-
MD5
1d963f2296c5363f16dff1165cb8e413
-
SHA1
15f699a8a754a937081a27ab75d4a793b82993e6
-
SHA256
ed8a7ffec56f450a365e758012db092883bbd23565f3f9fbb004c189fb703de3
-
SHA512
a76bf1f1398800ee0a09088d42dc38ce2d42b66e24a8cb4c97f1c055702483193467b562740c808106fa813614425304993f16e9a101e1e8202deec4ef65e2be
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-