General
-
Target
fda422a54b108ec592b499e0dc59e6c6.exe
-
Size
704KB
-
Sample
210330-49prt8wz2n
-
MD5
fda422a54b108ec592b499e0dc59e6c6
-
SHA1
8ee655935d7620a6d2f18f26d0532f9dfa8b56e8
-
SHA256
0e55e17532909ad5ad34eb4e35d791b27c6951dd15a8baba34c29ae572c884d0
-
SHA512
11a8e56836af1b1b86dbea68fc570535d2f74266fecda6fa9e6f90431d9596740632a35fa0ca86d8b9f58706425f3ecda2dc572f3c47bf7e2323c02f43ead52e
Static task
static1
Behavioral task
behavioral1
Sample
fda422a54b108ec592b499e0dc59e6c6.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
fda422a54b108ec592b499e0dc59e6c6.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
fda422a54b108ec592b499e0dc59e6c6.exe
-
Size
704KB
-
MD5
fda422a54b108ec592b499e0dc59e6c6
-
SHA1
8ee655935d7620a6d2f18f26d0532f9dfa8b56e8
-
SHA256
0e55e17532909ad5ad34eb4e35d791b27c6951dd15a8baba34c29ae572c884d0
-
SHA512
11a8e56836af1b1b86dbea68fc570535d2f74266fecda6fa9e6f90431d9596740632a35fa0ca86d8b9f58706425f3ecda2dc572f3c47bf7e2323c02f43ead52e
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-