General
-
Target
blxstealer.exe
-
Size
16.7MB
-
Sample
230608-tk2xtshd7v
-
MD5
9bbb694fc0cb499dd359d4488ae35f99
-
SHA1
45a7f31a8fce3da4bc02ca55bffd181353385ca2
-
SHA256
f667852cb3c04ef2f9afd282d00b2ec2c423e9f8e00811af2964255554a48842
-
SHA512
1fbdebe4eadd6afc63b5668dfeb73fadf694a1c4ac212b5b5a6eaa6a00d527a3d2865de8c46ab650ffd3f2d03130ac3b42a691749b348e78438f332a7d6ada41
-
SSDEEP
196608:pi0sKYu/PaQts15uN4FMIZETSRjPePdrQJM96KbABLOqie8VCtzYPOCl8de/yzyF:GQtsIQETSRvJQnqOqF8YzdCyd3AZ
Behavioral task
behavioral1
Sample
blxstealer.exe
Resource
win7-20230220-en
Malware Config
Targets
-
-
Target
blxstealer.exe
-
Size
16.7MB
-
MD5
9bbb694fc0cb499dd359d4488ae35f99
-
SHA1
45a7f31a8fce3da4bc02ca55bffd181353385ca2
-
SHA256
f667852cb3c04ef2f9afd282d00b2ec2c423e9f8e00811af2964255554a48842
-
SHA512
1fbdebe4eadd6afc63b5668dfeb73fadf694a1c4ac212b5b5a6eaa6a00d527a3d2865de8c46ab650ffd3f2d03130ac3b42a691749b348e78438f332a7d6ada41
-
SSDEEP
196608:pi0sKYu/PaQts15uN4FMIZETSRjPePdrQJM96KbABLOqie8VCtzYPOCl8de/yzyF:GQtsIQETSRvJQnqOqF8YzdCyd3AZ
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-