General
-
Target
PAP46E1UkZ.exe
-
Size
17.1MB
-
Sample
230320-vbqnwage71
-
MD5
8ef9e6f6e33937d4137e0b4ca5fabb07
-
SHA1
f9e4208c615691ed7fb36d6973f8eeb0c1cb2adf
-
SHA256
99e94275ebb5df4a70d8d225ead56cc295f915a5ee1f93d3e33432f1fc46ac4a
-
SHA512
b2b9bd8df7d4e9e3afd6b28847f0b0ae88ff452c1f6d19c02f9061d61f05d3b20f8a4bbaaefbaf23eab16d82373aa1d722ed3ac08ec8fff9ff9582c709b845cd
-
SSDEEP
393216:qQHu7L/WwAyXYPh8TInEroX/lh2plfEqirRRovon2P4j75rHOz1:lCL+TyXYErUNQppwvMo2B
Malware Config
Targets
-
-
Target
PAP46E1UkZ.exe
-
Size
17.1MB
-
MD5
8ef9e6f6e33937d4137e0b4ca5fabb07
-
SHA1
f9e4208c615691ed7fb36d6973f8eeb0c1cb2adf
-
SHA256
99e94275ebb5df4a70d8d225ead56cc295f915a5ee1f93d3e33432f1fc46ac4a
-
SHA512
b2b9bd8df7d4e9e3afd6b28847f0b0ae88ff452c1f6d19c02f9061d61f05d3b20f8a4bbaaefbaf23eab16d82373aa1d722ed3ac08ec8fff9ff9582c709b845cd
-
SSDEEP
393216:qQHu7L/WwAyXYPh8TInEroX/lh2plfEqirRRovon2P4j75rHOz1:lCL+TyXYErUNQppwvMo2B
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-