General
-
Target
c8160bcafcd6bf27d9b37ffd1985e029.exe
-
Size
1018KB
-
Sample
230502-ljrrgaad93
-
MD5
c8160bcafcd6bf27d9b37ffd1985e029
-
SHA1
fa8da691a6fddb294174eca4ee3cb222bbf3ab20
-
SHA256
f3253a3732bc4b99f4cca79e439d9f2fb25d6a4e1a75e47228b6aa8a5175e4b4
-
SHA512
20f80c5f6af3e8d48c89517f411e6e6820190f5fb170314e727e8e4cb42bae303ca47b1213502f8f44766ff9a4d1f7739d4f64de6914ed519376a9c421bcf041
-
SSDEEP
12288:lToPWBv/cpGrU3y4CDFOkZdhvRH9EfIpops7SQlMDbkHB6B1rAiQ13+jxLEj2NJJ:lTbBv5rUqDFzhvxpFKUEBCjDWhvP
Static task
static1
Behavioral task
behavioral1
Sample
c8160bcafcd6bf27d9b37ffd1985e029.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
c8160bcafcd6bf27d9b37ffd1985e029.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
eternity
http://eternityms33k74r7iuuxfda4sqsiei3o3lbtr5cpalf6f4skszpruad.onion
48zNQwXLksrS7S3ohbWAKRTYWu5htM4FG4sa9iz6LzgWj6ebFQzyJe9aWJbw4nsHR7KQyDrXKG6bxKQTJdj9Uhu138L9FDz
bc1q0zm2c9m7ep9j7yfmjkk382eelvkgg8m8akhej9
qqn2j7nsrncd0867hke7sej6yk3q2ey9kuve8umzux
0xF52FCCEfC7CAfed48536bf1b17B0Dff8Ee95D60B
0xF52FCCEfC7CAfed48536bf1b17B0Dff8Ee95D60B
DGvCy59BHkqydZWzr2c7qgWxrsnfHGKj5M
THG5ALgNC9uwfTC2tRWvZqJ3SgHG4Z6R8d
LiD2oz6qhJqoqH5oH2jv1ERLgvVTH1HKV8
rQKosTtwF1JWHmb6MoCrqLfBArYMsg3ZE3
t1XM4gi72v4MbLm9DM5ijhN717K5GvAt6hG
Xuzg4FNTNzX5Z1RatRHZ7QKWkPYhCaTDpK
ASFsKZ7qWizPXt97mTGrpXRpFyTJ4QHV9K
GDJ36G2L3XQMIDOX5RC2PAJ7NKKWIR2IU7TCY6WW3O7IGTCCKZUCPQ4G
7hJcKEr29NoKn25p3k7bpSYVKeGAqueUPstP6w8SDHEm
UAITL6ZCTXIZIHPBJYNNV3RO464YYLILGHZ5WXSK4QFHWROSGRBGN5Y6TU
Targets
-
-
Target
c8160bcafcd6bf27d9b37ffd1985e029.exe
-
Size
1018KB
-
MD5
c8160bcafcd6bf27d9b37ffd1985e029
-
SHA1
fa8da691a6fddb294174eca4ee3cb222bbf3ab20
-
SHA256
f3253a3732bc4b99f4cca79e439d9f2fb25d6a4e1a75e47228b6aa8a5175e4b4
-
SHA512
20f80c5f6af3e8d48c89517f411e6e6820190f5fb170314e727e8e4cb42bae303ca47b1213502f8f44766ff9a4d1f7739d4f64de6914ed519376a9c421bcf041
-
SSDEEP
12288:lToPWBv/cpGrU3y4CDFOkZdhvRH9EfIpops7SQlMDbkHB6B1rAiQ13+jxLEj2NJJ:lTbBv5rUqDFzhvxpFKUEBCjDWhvP
Score10/10-
Detects Eternity clipper
-
Eternity
Eternity Project is a malware kit offering an info stealer, clipper, worm, coin miner, ransomware, and DDoS bot.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-