General
-
Target
5d1a5e6a0fe0de08388bcc77c01a9d65f02027a7e049cb2502dbb5ae0051b14e
-
Size
18.0MB
-
Sample
231004-lvl1cscf65
-
MD5
f756a17dfe696ec8ab80d65766298ea3
-
SHA1
8e01305af072036815852b5aa8338497c96f920c
-
SHA256
5d1a5e6a0fe0de08388bcc77c01a9d65f02027a7e049cb2502dbb5ae0051b14e
-
SHA512
b56c30c5b624c1d196c4bc6d6ec5146c3f50004a36b2388b68b3145139ac1f7fff4daebfc996fd8d128e1f358388a79de965d695f5b102e990cb7a571b191798
-
SSDEEP
393216:WQtsT4aTKk3meBcGfd0NYMvv8f6lCOdSV:WQtsc+KaT5F0NYob2
Malware Config
Targets
-
-
Target
5d1a5e6a0fe0de08388bcc77c01a9d65f02027a7e049cb2502dbb5ae0051b14e
-
Size
18.0MB
-
MD5
f756a17dfe696ec8ab80d65766298ea3
-
SHA1
8e01305af072036815852b5aa8338497c96f920c
-
SHA256
5d1a5e6a0fe0de08388bcc77c01a9d65f02027a7e049cb2502dbb5ae0051b14e
-
SHA512
b56c30c5b624c1d196c4bc6d6ec5146c3f50004a36b2388b68b3145139ac1f7fff4daebfc996fd8d128e1f358388a79de965d695f5b102e990cb7a571b191798
-
SSDEEP
393216:WQtsT4aTKk3meBcGfd0NYMvv8f6lCOdSV:WQtsc+KaT5F0NYob2
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-