General
-
Target
advertising.exe
-
Size
19.9MB
-
Sample
231012-psfmcaac7t
-
MD5
1602161a628878a7ed669947e0cbfb51
-
SHA1
50522bfc2ccd102abe24c6161d648cb689809dce
-
SHA256
e45d9783e91c4af4861345ba9f21a76fee550147804cc0d9fc5f742f1d9c8b3a
-
SHA512
cea3c8ce6798406d4d2ae1409c644285f125a0708b1c99fb00e2497e6d4c7f130e68e1cc855d8e7b61fca7e333db0234725232169adc093ea0b98ea72e15a6e5
-
SSDEEP
393216:TiIE7YoPQtsT4Hr7M5li8k3meCcGfd0NYMbkf76lCOdSx:A7rPQtscL7M5lDaY5F0NY2x2
Behavioral task
behavioral1
Sample
advertising.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
advertising.exe
-
Size
19.9MB
-
MD5
1602161a628878a7ed669947e0cbfb51
-
SHA1
50522bfc2ccd102abe24c6161d648cb689809dce
-
SHA256
e45d9783e91c4af4861345ba9f21a76fee550147804cc0d9fc5f742f1d9c8b3a
-
SHA512
cea3c8ce6798406d4d2ae1409c644285f125a0708b1c99fb00e2497e6d4c7f130e68e1cc855d8e7b61fca7e333db0234725232169adc093ea0b98ea72e15a6e5
-
SSDEEP
393216:TiIE7YoPQtsT4Hr7M5li8k3meCcGfd0NYMbkf76lCOdSx:A7rPQtscL7M5lDaY5F0NY2x2
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-