General
-
Target
Vape.exe
-
Size
26.2MB
-
Sample
231012-hrha8afa39
-
MD5
791c3bf66c8a105074b9fc0661900fae
-
SHA1
4f14127b9b75eedff2ca01a6802cdab0135f6824
-
SHA256
d106a7d59ca96b1ab6453779b4c776a8a1eb50c18301cfea74d8dffc58918ce4
-
SHA512
b20b2960249c9e0104156daaa214ca2455bff03106081d85eee6f98962ce1e08d80198174ac8ca4e5afa1260b1cacdb7f895f453af20b9b4fd7230f91bcacb51
-
SSDEEP
786432:vY4wouTtRLkpUXKmVdm/WL/H8b9ggYDL6cHNraZk:vY4QtucKmsggC+Zk
Behavioral task
behavioral1
Sample
Vape.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Vape.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
Vape.exe
-
Size
26.2MB
-
MD5
791c3bf66c8a105074b9fc0661900fae
-
SHA1
4f14127b9b75eedff2ca01a6802cdab0135f6824
-
SHA256
d106a7d59ca96b1ab6453779b4c776a8a1eb50c18301cfea74d8dffc58918ce4
-
SHA512
b20b2960249c9e0104156daaa214ca2455bff03106081d85eee6f98962ce1e08d80198174ac8ca4e5afa1260b1cacdb7f895f453af20b9b4fd7230f91bcacb51
-
SSDEEP
786432:vY4wouTtRLkpUXKmVdm/WL/H8b9ggYDL6cHNraZk:vY4QtucKmsggC+Zk
Score7/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-