General

  • Target

    kiwi-x-bloxflip-predictor-main.zip

  • Size

    24.1MB

  • Sample

    230409-y6npjseg3s

  • MD5

    a6dcc1aec2b0d991cde7661274f1f64c

  • SHA1

    a2533ca102bd420324a2428babf70d68f964da28

  • SHA256

    36f261d847102dad75aaf7f55fba47a55376316381ac43e0b7fe279812d021c0

  • SHA512

    6253fe96c6fb48e8937d817c260085a18c74b475d707f96b74a3b1c060e14fcb823e758aa9a1fe2032bf6cb9a6b1db83f1529c99a2b180cff4985d4bdfde3550

  • SSDEEP

    393216:kvRSmpI5+xtNle32Vjpixwo4cx0HIgkO4JFbrd0c1VR:A0mG5+xtNlJaKS0qORc13

Malware Config

Targets

    • Target

      kiwi-x-bloxflip-predictor-main/kiwi-x-bloxflip-predictor-main/kiwi-x-bloxflip-predictor-main/Kiwi-V2-main/Bunifu_UI_v1.5.3.dll

    • Size

      516KB

    • MD5

      8cd9953ff0283305f3998f6893c7d244

    • SHA1

      db906639e1b164bb813e3e94e548a4c5549bd36e

    • SHA256

      0a3f02ad6a8f319b352f4ab3222bd57d9699882db065fb344b9828243b1d0015

    • SHA512

      3121712026e63ae2c9df423c24511249895e773a5e56f3fd19dff89eefe58042c990afcd7ffba21bf9f181045b9b4d9f439c7e69114f0f9282adbd707558e133

    • SSDEEP

      12288:MykYXttq4mBpDetgo3DcHGF2HcvHWUSA9uN:iYi4Xt7zcHGFxI+uN

    Score
    1/10
    • Target

      kiwi-x-bloxflip-predictor-main/kiwi-x-bloxflip-predictor-main/kiwi-x-bloxflip-predictor-main/Kiwi-V2-main/Guna.UI2.dll

    • Size

      2.3MB

    • MD5

      b7cf1039d089511ff4594d0796dc966b

    • SHA1

      e41d50c48f5381da01ed43967d1024fdaaeedd81

    • SHA256

      9143707613cfa106fc4d7177e6e9f8a544738989b6167cd6578101f1bdb0927a

    • SHA512

      6627a7a810c78a94ff1d52b14d071f8aabd71a2e6b521d2fcea7d865d94f5bcb1dd890f1b93b292035b20127507e32c11c215268e00510e5bf28c6132a4ce2a4

    • SSDEEP

      49152:DpR548WTt9kUHdvAmZL0Th+1n9fr2flQChRigKw1:54JErh0gz1

    Score
    1/10
    • Target

      kiwi-x-bloxflip-predictor-main/kiwi-x-bloxflip-predictor-main/kiwi-x-bloxflip-predictor-main/Kiwi-V2-main/kiwi.exe

    • Size

      23.0MB

    • MD5

      e52c9053670a8458424abca9d8d9b7a0

    • SHA1

      12c2694c30057559646f72d809bb0996fcad0aec

    • SHA256

      a7b92f86cd3a510d086cd9ddbab7ff9526b5592cd38a7bf161e7c911caeffe68

    • SHA512

      a67661c2caa938f1fba17476fb5f9614e958694512d6e88b40a71b6d2196ea6f565d7b9208f6500d5b3ef964f9472ecad00bd1c10ff9d7aa4e13293862a0e710

    • SSDEEP

      393216:BZAlUljz3kBEW/m3pc+/oTW8amuFKWD2NJ/2dOYG:BWlUljz3aKJCW8du92DvY

    Score
    7/10
    • Loads dropped DLL

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix

Tasks