General
-
Target
electrum-monero-classic.exe
-
Size
19.9MB
-
Sample
211116-yy81hsfch9
-
MD5
e7974b4c9ed4f20a4bb74982e22fe2c0
-
SHA1
0c6b6e77219169aab800fbb941d37393ac0dcfec
-
SHA256
3c3be6e127da2999baa57c99bc3f65db319cf96c8a10d6ffead51c057c5a7490
-
SHA512
672fce3dc9f2d9108e821cf862f1fee3cae10ed5aa76caac4a60c6c0e8a953d981ea3d19c5b4255debb9037435897544ad07594c6ef4b51c2434d184f0b7d1bc
Static task
static1
Behavioral task
behavioral1
Sample
electrum-monero-classic.exe
Resource
win7-de-20211014
Malware Config
Targets
-
-
Target
electrum-monero-classic.exe
-
Size
19.9MB
-
MD5
e7974b4c9ed4f20a4bb74982e22fe2c0
-
SHA1
0c6b6e77219169aab800fbb941d37393ac0dcfec
-
SHA256
3c3be6e127da2999baa57c99bc3f65db319cf96c8a10d6ffead51c057c5a7490
-
SHA512
672fce3dc9f2d9108e821cf862f1fee3cae10ed5aa76caac4a60c6c0e8a953d981ea3d19c5b4255debb9037435897544ad07594c6ef4b51c2434d184f0b7d1bc
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-