General
-
Target
Test Build 1.exe
-
Size
8.8MB
-
Sample
231011-xfsp5sfa8s
-
MD5
d84f6e5c91d14aee3cfffa17c4a43463
-
SHA1
8a8b769880ec56e956e8e48c61fea87ec4249c36
-
SHA256
c9f20ebf241e7b49223d5b0baab24fe32775b8483bd92e78e7395ba8348f6ea0
-
SHA512
4ac321ca6d6f7b1e6698c8decc18ed78b017ac2fac8df62287ca1b66b665c16e051963eeb83b2e6d60294354000501e0f305908497f7a9fbb575ad1f1b277477
-
SSDEEP
196608:xCZ2DwGcsAgectcGfcY3gtbUwIf7E5MsFrGgSPJ9:42k3meWcGfdyUYMco9
Static task
static1
Behavioral task
behavioral1
Sample
Test Build 1.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
Test Build 1.exe
-
Size
8.8MB
-
MD5
d84f6e5c91d14aee3cfffa17c4a43463
-
SHA1
8a8b769880ec56e956e8e48c61fea87ec4249c36
-
SHA256
c9f20ebf241e7b49223d5b0baab24fe32775b8483bd92e78e7395ba8348f6ea0
-
SHA512
4ac321ca6d6f7b1e6698c8decc18ed78b017ac2fac8df62287ca1b66b665c16e051963eeb83b2e6d60294354000501e0f305908497f7a9fbb575ad1f1b277477
-
SSDEEP
196608:xCZ2DwGcsAgectcGfcY3gtbUwIf7E5MsFrGgSPJ9:42k3meWcGfdyUYMco9
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-