General
-
Target
Skript.gg.exe
-
Size
7.4MB
-
Sample
231104-gb1l7aeg76
-
MD5
1f1890c78c2664fbd09f8c447ad127e6
-
SHA1
e6cac8e8338f7d00c66e471512cf21b30f9c123e
-
SHA256
6046da9748a3ce63d1af857498abb86c9221930daa55481dafbe7f71bae0faa4
-
SHA512
9104c92edbc37605f650c6e1647d9f2039dd6d3886de7d12ea3b920e2a136803291658b1b49cbc14ca19abf1eeb56daa20d966de79c5976c91699278a749d42b
-
SSDEEP
196608:5vYS6JOshoKMuIkhVastRL5Di3uz1D7c0B:xYS8OshouIkPftRL54aRZB
Behavioral task
behavioral1
Sample
Skript.gg.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
Skript.gg.exe
-
Size
7.4MB
-
MD5
1f1890c78c2664fbd09f8c447ad127e6
-
SHA1
e6cac8e8338f7d00c66e471512cf21b30f9c123e
-
SHA256
6046da9748a3ce63d1af857498abb86c9221930daa55481dafbe7f71bae0faa4
-
SHA512
9104c92edbc37605f650c6e1647d9f2039dd6d3886de7d12ea3b920e2a136803291658b1b49cbc14ca19abf1eeb56daa20d966de79c5976c91699278a749d42b
-
SSDEEP
196608:5vYS6JOshoKMuIkhVastRL5Di3uz1D7c0B:xYS8OshouIkPftRL54aRZB
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-