General
-
Target
Built.exe
-
Size
7.3MB
-
Sample
231007-xkzz1see8v
-
MD5
e1d763aeb60d7834d65a3679ec7e5937
-
SHA1
997f4f7de90a22880b25241b4d7d8b0339786754
-
SHA256
9f8c2ad49aaf02abfe57d6f54482b65d3e24170a70cb2073c88ecc885fc4cdd3
-
SHA512
a479981895784c580da0ed1b82896a08b77402542b82a2792c9e7af76ca04b096dc8a7575dc3e8b327f97483a8821821caa4edc4304cbaa9a7c439ef4a98f71e
-
SSDEEP
196608:bucYAFQjOOshoKMuIkhVastRL5Di3uTIuQd/07:NYAVOshouIkPftRL54huis7
Malware Config
Targets
-
-
Target
Built.exe
-
Size
7.3MB
-
MD5
e1d763aeb60d7834d65a3679ec7e5937
-
SHA1
997f4f7de90a22880b25241b4d7d8b0339786754
-
SHA256
9f8c2ad49aaf02abfe57d6f54482b65d3e24170a70cb2073c88ecc885fc4cdd3
-
SHA512
a479981895784c580da0ed1b82896a08b77402542b82a2792c9e7af76ca04b096dc8a7575dc3e8b327f97483a8821821caa4edc4304cbaa9a7c439ef4a98f71e
-
SSDEEP
196608:bucYAFQjOOshoKMuIkhVastRL5Di3uTIuQd/07:NYAVOshouIkPftRL54huis7
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-