General
-
Target
2cc269e4ccb3cea7d93327bc53ed6af9543b347170dc7ad550fe10ed03076e5e
-
Size
1.5MB
-
Sample
220614-1mblzseddl
-
MD5
4cb6739aed0e0f16b64ef43fa4c2e671
-
SHA1
db0a4d5415f863d084997f525942d106287ffa3e
-
SHA256
2cc269e4ccb3cea7d93327bc53ed6af9543b347170dc7ad550fe10ed03076e5e
-
SHA512
408964b9d15437e534f33ddcb7b3b8f20d2f3c2c79689818f69232f9d20196755c18269535264af32f40eaf85570472f9e0b082a97786bb62be58ca6b00639d5
Static task
static1
Behavioral task
behavioral1
Sample
2cc269e4ccb3cea7d93327bc53ed6af9543b347170dc7ad550fe10ed03076e5e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
2cc269e4ccb3cea7d93327bc53ed6af9543b347170dc7ad550fe10ed03076e5e.exe
Resource
win10v2004-20220414-en
Malware Config
Extracted
C:\README1.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Targets
-
-
Target
2cc269e4ccb3cea7d93327bc53ed6af9543b347170dc7ad550fe10ed03076e5e
-
Size
1.5MB
-
MD5
4cb6739aed0e0f16b64ef43fa4c2e671
-
SHA1
db0a4d5415f863d084997f525942d106287ffa3e
-
SHA256
2cc269e4ccb3cea7d93327bc53ed6af9543b347170dc7ad550fe10ed03076e5e
-
SHA512
408964b9d15437e534f33ddcb7b3b8f20d2f3c2c79689818f69232f9d20196755c18269535264af32f40eaf85570472f9e0b082a97786bb62be58ca6b00639d5
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-