General
-
Target
Kerelin_Logger.exe
-
Size
14.3MB
-
Sample
230521-rxv9psdc5y
-
MD5
c1f844e9eea973a5035c6fd8cfd8eef3
-
SHA1
c8583a8a060ebfcbd42bda46459fda83831d00e0
-
SHA256
580debd3017ff4544ce5b53ae207e7084ed6d54989fd2b0f810415d2303428c4
-
SHA512
dc75ba0e50e65faff48c711d4d44199cf0dbb3f46291d63fb3a058bcfd04027fbbe011179bceda2400729089fae3323a30724792680a133f7a46cdfd9ca5328e
-
SSDEEP
393216:Ru7L/qdQusl7Q+q9RoWOv+9faqNW5mCVVf:RCLydQu2QdborvSikW4CVh
Behavioral task
behavioral1
Sample
Kerelin_Logger.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
Kerelin_Logger.exe
-
Size
14.3MB
-
MD5
c1f844e9eea973a5035c6fd8cfd8eef3
-
SHA1
c8583a8a060ebfcbd42bda46459fda83831d00e0
-
SHA256
580debd3017ff4544ce5b53ae207e7084ed6d54989fd2b0f810415d2303428c4
-
SHA512
dc75ba0e50e65faff48c711d4d44199cf0dbb3f46291d63fb3a058bcfd04027fbbe011179bceda2400729089fae3323a30724792680a133f7a46cdfd9ca5328e
-
SSDEEP
393216:Ru7L/qdQusl7Q+q9RoWOv+9faqNW5mCVVf:RCLydQu2QdborvSikW4CVh
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-