General
-
Target
idfwe.exe
-
Size
8.3MB
-
Sample
231101-a8wk6sac89
-
MD5
43f00f83875959b2984e9fe38b21c11a
-
SHA1
93a7549af73965276dc5ab1bec624386a59ac14d
-
SHA256
6ca42ad9c6fa225087736b28921a69b678a082eaf066c03f86aa98eedf675937
-
SHA512
21b460733af270113171f220602d595ceaaebaf90f885f792bd1bf887d1e0105a3698fb75f9fd05d3465e90356fa5381f4c594fad4791c24820d5c0a7c7495e2
-
SSDEEP
196608:za/u78K/1+7ndQmRJ8dA6l7aycBIGpEGo6hTOv+QKfCQp+1Mi86:e/u7L/QndQusl29foWOv+9f
Behavioral task
behavioral1
Sample
idfwe.exe
Resource
win10-20231023-en
Malware Config
Targets
-
-
Target
idfwe.exe
-
Size
8.3MB
-
MD5
43f00f83875959b2984e9fe38b21c11a
-
SHA1
93a7549af73965276dc5ab1bec624386a59ac14d
-
SHA256
6ca42ad9c6fa225087736b28921a69b678a082eaf066c03f86aa98eedf675937
-
SHA512
21b460733af270113171f220602d595ceaaebaf90f885f792bd1bf887d1e0105a3698fb75f9fd05d3465e90356fa5381f4c594fad4791c24820d5c0a7c7495e2
-
SSDEEP
196608:za/u78K/1+7ndQmRJ8dA6l7aycBIGpEGo6hTOv+QKfCQp+1Mi86:e/u7L/QndQusl29foWOv+9f
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-