General
-
Target
loader.exe
-
Size
17.1MB
-
Sample
230415-rj8ymsfh4t
-
MD5
9102d61496411b2c445797ea297f23b8
-
SHA1
dfe742be54565130ab9c01dfedffc0f23ca245a8
-
SHA256
30f52839ef50d3cf1d98baa1ed0cf55bbd4997b12d981e737055508f87595cf4
-
SHA512
fc0265fece5255f1cc5d73152085f6aead48854e120b7312b8dd31fcb020965cc7fe4069fb65cadf120ff6474363c107919bffa1cacf56628d0877484f57e5f7
-
SSDEEP
393216:du7L/N1obI/bdQuslN/m3pql9AJ4ZoWOv+9fPV4alXgFg+GCICB0:dCLV1h/bdQu4KyS4ZorvS34Fg+TIA0
Behavioral task
behavioral1
Sample
loader.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
loader.exe
-
Size
17.1MB
-
MD5
9102d61496411b2c445797ea297f23b8
-
SHA1
dfe742be54565130ab9c01dfedffc0f23ca245a8
-
SHA256
30f52839ef50d3cf1d98baa1ed0cf55bbd4997b12d981e737055508f87595cf4
-
SHA512
fc0265fece5255f1cc5d73152085f6aead48854e120b7312b8dd31fcb020965cc7fe4069fb65cadf120ff6474363c107919bffa1cacf56628d0877484f57e5f7
-
SSDEEP
393216:du7L/N1obI/bdQuslN/m3pql9AJ4ZoWOv+9fPV4alXgFg+GCICB0:dCLV1h/bdQu4KyS4ZorvS34Fg+TIA0
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-