General
-
Target
962ea3e84b772c84bc0d9495cc00bf547ca80ac1ed34026cb971b6f5eb9deec8
-
Size
200KB
-
Sample
220323-g663fsgff4
-
MD5
976d2ac418b0ab2b953df538c2d340db
-
SHA1
d246fa7fbe13895ba7eda0a7be4f3403b9365147
-
SHA256
962ea3e84b772c84bc0d9495cc00bf547ca80ac1ed34026cb971b6f5eb9deec8
-
SHA512
9ed8dcdfb6a0b016d6d92a4bfe1aac77791733821434e4df568952035e13026280347eb24d82235d2e2988ce285001fea5685ec88e29fda744f1325f07c4b76a
Static task
static1
Behavioral task
behavioral1
Sample
962ea3e84b772c84bc0d9495cc00bf547ca80ac1ed34026cb971b6f5eb9deec8.exe
Resource
win10-20220223-en
Malware Config
Extracted
oski
wellsfargocs.ddns.us
Targets
-
-
Target
962ea3e84b772c84bc0d9495cc00bf547ca80ac1ed34026cb971b6f5eb9deec8
-
Size
200KB
-
MD5
976d2ac418b0ab2b953df538c2d340db
-
SHA1
d246fa7fbe13895ba7eda0a7be4f3403b9365147
-
SHA256
962ea3e84b772c84bc0d9495cc00bf547ca80ac1ed34026cb971b6f5eb9deec8
-
SHA512
9ed8dcdfb6a0b016d6d92a4bfe1aac77791733821434e4df568952035e13026280347eb24d82235d2e2988ce285001fea5685ec88e29fda744f1325f07c4b76a
Score10/10-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-