General
-
Target
Installer.exe
-
Size
14.3MB
-
Sample
231014-bfnkjagh9t
-
MD5
ca70851e655b4100230a08bc3901b4ff
-
SHA1
dad50bc34eb66b5f36aa339ae8fda51efe108389
-
SHA256
ae18c9e7933f2805c2ed133f3d295eb9f0413b4d10e9140e2acd4d8be92ac72f
-
SHA512
1a591c5c74297914e35420b8eec8d5abd86383215bef35b7defc776e5ec8fed86ee76aa5dbb669fc6e2c375318d0beef7c97cf79214c69f1bbf7638f900c7434
-
SSDEEP
393216:ju7L/sQPndQuslSq9RoWOv+9fgxNg891awj:jCL0QPndQuSborvSY/gq0
Behavioral task
behavioral1
Sample
Installer.exe
Resource
win7-20230831-en
Malware Config
Targets
-
-
Target
Installer.exe
-
Size
14.3MB
-
MD5
ca70851e655b4100230a08bc3901b4ff
-
SHA1
dad50bc34eb66b5f36aa339ae8fda51efe108389
-
SHA256
ae18c9e7933f2805c2ed133f3d295eb9f0413b4d10e9140e2acd4d8be92ac72f
-
SHA512
1a591c5c74297914e35420b8eec8d5abd86383215bef35b7defc776e5ec8fed86ee76aa5dbb669fc6e2c375318d0beef7c97cf79214c69f1bbf7638f900c7434
-
SSDEEP
393216:ju7L/sQPndQuslSq9RoWOv+9fgxNg891awj:jCL0QPndQuSborvSY/gq0
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-