General
-
Target
Spoofer_V2.exe
-
Size
7.0MB
-
Sample
230703-zzwl9aab48
-
MD5
c891d597d2cf96b3bc2b21e4e4077c62
-
SHA1
e0d5f4dd9d987c562bdaf9432364dda940243bd3
-
SHA256
6a8fca780453dadf8ae7af201f70f07192a2108b769babe8d6f7057cb6cec227
-
SHA512
e95c80adad137e473f0117c4f277d7c98f385ba72791a6176020b7c6bc76d9a30d3582af6ddf774a79007573f15af72762cac161a20cdd499f4109d5fe33076d
-
SSDEEP
98304:rrzHqdVfB2GyuT/9vUIdD9C+z3zO917vOTh+ezsNhx5S2zh/hQqGCiEpRmOZc8:rnQsGbT/9bvLz3S1bA329OqGCiEpYOZj
Static task
static1
Malware Config
Targets
-
-
Target
Spoofer_V2.exe
-
Size
7.0MB
-
MD5
c891d597d2cf96b3bc2b21e4e4077c62
-
SHA1
e0d5f4dd9d987c562bdaf9432364dda940243bd3
-
SHA256
6a8fca780453dadf8ae7af201f70f07192a2108b769babe8d6f7057cb6cec227
-
SHA512
e95c80adad137e473f0117c4f277d7c98f385ba72791a6176020b7c6bc76d9a30d3582af6ddf774a79007573f15af72762cac161a20cdd499f4109d5fe33076d
-
SSDEEP
98304:rrzHqdVfB2GyuT/9vUIdD9C+z3zO917vOTh+ezsNhx5S2zh/hQqGCiEpRmOZc8:rnQsGbT/9bvLz3S1bA329OqGCiEpYOZj
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-