General
-
Target
2a4569106eacda6cc815b3c68db2c7596e3c029878ec7d33ece28d87fe9f4c45
-
Size
7.1MB
-
Sample
220521-ax3v4sahg7
-
MD5
1291d0e7259bebe1ae1677716093faa1
-
SHA1
bc000650222b120acc6b041dc70744a0b73e1dce
-
SHA256
2a4569106eacda6cc815b3c68db2c7596e3c029878ec7d33ece28d87fe9f4c45
-
SHA512
ede41f8ad4bfbfdf5b21a4ead8bf375740e9af7047ac7efca2f95f957ac20344e6f3e5f8cf31e59d6028b003bd59504cdd10729acdca58d4d391f9146ad02193
Static task
static1
Behavioral task
behavioral1
Sample
2a4569106eacda6cc815b3c68db2c7596e3c029878ec7d33ece28d87fe9f4c45.exe
Resource
win7-20220414-en
Malware Config
Targets
-
-
Target
2a4569106eacda6cc815b3c68db2c7596e3c029878ec7d33ece28d87fe9f4c45
-
Size
7.1MB
-
MD5
1291d0e7259bebe1ae1677716093faa1
-
SHA1
bc000650222b120acc6b041dc70744a0b73e1dce
-
SHA256
2a4569106eacda6cc815b3c68db2c7596e3c029878ec7d33ece28d87fe9f4c45
-
SHA512
ede41f8ad4bfbfdf5b21a4ead8bf375740e9af7047ac7efca2f95f957ac20344e6f3e5f8cf31e59d6028b003bd59504cdd10729acdca58d4d391f9146ad02193
-
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
suricata: ET MALWARE EXE Download Request To Wordpress Folder Likely Malicious
-
ACProtect 1.3x - 1.4x DLL software
Detects file using ACProtect software.
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-