General
-
Target
IntegraL.exe
-
Size
1.7MB
-
Sample
210412-rjjasnf7e6
-
MD5
3a441719e8227b47c48b143a818fd9db
-
SHA1
a86e0f25041c2fd53fe5c9b0ef562dfd465beea8
-
SHA256
5264cba383d033b281e0d9c097225f350fa4cb4aa910621638e79c8659ac4035
-
SHA512
521dec402204e331cdd338676a9b2a355f5dfd7cf331511e79ed9b5b31b0719c025cf6dfdcf437b73fec89ab9f327473de3770f6c248fc1aba4bcd74e0d0c136
Static task
static1
Behavioral task
behavioral1
Sample
IntegraL.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
IntegraL.exe
-
Size
1.7MB
-
MD5
3a441719e8227b47c48b143a818fd9db
-
SHA1
a86e0f25041c2fd53fe5c9b0ef562dfd465beea8
-
SHA256
5264cba383d033b281e0d9c097225f350fa4cb4aa910621638e79c8659ac4035
-
SHA512
521dec402204e331cdd338676a9b2a355f5dfd7cf331511e79ed9b5b31b0719c025cf6dfdcf437b73fec89ab9f327473de3770f6c248fc1aba4bcd74e0d0c136
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-