General
-
Target
c39b6247c3d38b4e06f05db01e440bd72cc99b2c000c2d082b22b87a64e2cc8e
-
Size
349KB
-
Sample
220109-3y9z2aebal
-
MD5
bdb742be28cdd944d6d76e7f848f5a8d
-
SHA1
81ed39584d00f6983f6332d0404bb8e8c0d7ea4b
-
SHA256
c39b6247c3d38b4e06f05db01e440bd72cc99b2c000c2d082b22b87a64e2cc8e
-
SHA512
e96c9e5fe7cf463ee29f49cd3ab24b5fc0eff8390f745f7e701451b72e0487d319c7c6ec636823cabc29b677406ed9b2445c7c4a8ffe2bfb9409b0bee3307bdf
Static task
static1
Malware Config
Targets
-
-
Target
c39b6247c3d38b4e06f05db01e440bd72cc99b2c000c2d082b22b87a64e2cc8e
-
Size
349KB
-
MD5
bdb742be28cdd944d6d76e7f848f5a8d
-
SHA1
81ed39584d00f6983f6332d0404bb8e8c0d7ea4b
-
SHA256
c39b6247c3d38b4e06f05db01e440bd72cc99b2c000c2d082b22b87a64e2cc8e
-
SHA512
e96c9e5fe7cf463ee29f49cd3ab24b5fc0eff8390f745f7e701451b72e0487d319c7c6ec636823cabc29b677406ed9b2445c7c4a8ffe2bfb9409b0bee3307bdf
-
LoaderBot executable
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Drops startup file
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
Suspicious use of SetThreadContext
-