General
-
Target
UserInfoUpdated.exe
-
Size
19.9MB
-
Sample
230917-e33jrafd2y
-
MD5
71e21f6e321d61573d538be965bea00a
-
SHA1
55b2e23c4aa527091b052a6b4a06c7d122fbf3d2
-
SHA256
46019f2c2ef63599a9f66e83e6d0e76cf58d4037c0678bb689e93e77b2c45296
-
SHA512
b2634a1180f2d6759e74e0acc777a0abf7d81cfeaf2bac64c90017664ab4f899179f20996ea01c3d31d536678ab997a4316204e4880e4498b6d78cf0ecd86b7b
-
SSDEEP
393216:UQtsT4Hr7M5li8k3meCcGfd0NYMAWh8k/clAfhGh:UQtscL7M5lDaY5F0NYoha7
Behavioral task
behavioral1
Sample
UserInfoUpdated.exe
Resource
win10-20230915-en
Malware Config
Targets
-
-
Target
UserInfoUpdated.exe
-
Size
19.9MB
-
MD5
71e21f6e321d61573d538be965bea00a
-
SHA1
55b2e23c4aa527091b052a6b4a06c7d122fbf3d2
-
SHA256
46019f2c2ef63599a9f66e83e6d0e76cf58d4037c0678bb689e93e77b2c45296
-
SHA512
b2634a1180f2d6759e74e0acc777a0abf7d81cfeaf2bac64c90017664ab4f899179f20996ea01c3d31d536678ab997a4316204e4880e4498b6d78cf0ecd86b7b
-
SSDEEP
393216:UQtsT4Hr7M5li8k3meCcGfd0NYMAWh8k/clAfhGh:UQtscL7M5lDaY5F0NYoha7
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Registers COM server for autorun
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-