General
-
Target
file.exe
-
Size
392KB
-
Sample
230423-gkcaysbd45
-
MD5
8fb5fb043d32cc851f3c3adb5ad9464a
-
SHA1
da88c77a4303520cb05591fb0d09d20bee4c3be0
-
SHA256
784fc4352b78136eb80cbf19bf89707ec2414c1daf3082774cecab08110b6ce7
-
SHA512
c4ec2219c92d6c22e386d640929e9d399b37d798499d57074a8dcb218ed30808e1ffa7c7bf6d88673c7c954e075bd7388af280c7bdafa44f7aacb91d0fe2536f
-
SSDEEP
12288:jQJCcGe4/a5qUvmaziL9iEVBfGr/w+au5:jQJo/IqWY9R5GDw+
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
file.exe
-
Size
392KB
-
MD5
8fb5fb043d32cc851f3c3adb5ad9464a
-
SHA1
da88c77a4303520cb05591fb0d09d20bee4c3be0
-
SHA256
784fc4352b78136eb80cbf19bf89707ec2414c1daf3082774cecab08110b6ce7
-
SHA512
c4ec2219c92d6c22e386d640929e9d399b37d798499d57074a8dcb218ed30808e1ffa7c7bf6d88673c7c954e075bd7388af280c7bdafa44f7aacb91d0fe2536f
-
SSDEEP
12288:jQJCcGe4/a5qUvmaziL9iEVBfGr/w+au5:jQJo/IqWY9R5GDw+
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-