General
-
Target
GolxCheats_V2.exe
-
Size
14.4MB
-
Sample
231022-ll7wgaha32
-
MD5
fc7e20dee0851224167a37798c91d0ec
-
SHA1
5d091aeaacffd0ee6ff965b0e85c3a85ea544c6b
-
SHA256
a4fd88e3e55850dd51d118615058fe3621a5a6665796ea183084d56e730c61bd
-
SHA512
ba5bd6780da983e051612c4a38e58d441cfd095fa6dc6ebec5c726d6dcd3811a233ca67fcfc8e1136646dd645839014266cc60034cbfb62a5fb95d6883ca00e7
-
SSDEEP
393216:pu7L/sQbVdQuslSq99oWOv+9fg3XG8+25:pCL0QbVdQuSDorvSY3HP
Malware Config
Targets
-
-
Target
GolxCheats_V2.exe
-
Size
14.4MB
-
MD5
fc7e20dee0851224167a37798c91d0ec
-
SHA1
5d091aeaacffd0ee6ff965b0e85c3a85ea544c6b
-
SHA256
a4fd88e3e55850dd51d118615058fe3621a5a6665796ea183084d56e730c61bd
-
SHA512
ba5bd6780da983e051612c4a38e58d441cfd095fa6dc6ebec5c726d6dcd3811a233ca67fcfc8e1136646dd645839014266cc60034cbfb62a5fb95d6883ca00e7
-
SSDEEP
393216:pu7L/sQbVdQuslSq99oWOv+9fg3XG8+25:pCL0QbVdQuSDorvSY3HP
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-