General
-
Target
0156e735c5a7240f2a5ca52de79a020fabd1cae02ac7b406ce13b9e59119aceb
-
Size
11.6MB
-
Sample
231111-fb3k4sbg65
-
MD5
bc2d0d2db3abf1547a20ecc2ef80ac02
-
SHA1
bd3175ceef88f3b715cea519ebd74ec5202fa99a
-
SHA256
0156e735c5a7240f2a5ca52de79a020fabd1cae02ac7b406ce13b9e59119aceb
-
SHA512
a85e40088090df4f167d323b6dbe357ee647d57c80e8fa96bcdf26a5b25fb5912eccd79abc2e3ed9b0e98ec4ff0284d3267aa2ee001cc7605123909c0b5c9b60
-
SSDEEP
196608:VNh64RGdML3MLjv+bhqNVoBPD7fEXEoY2Iv9jM2W1vk93Ii6SfiIU1Wom:ZUdML3cL+9qz8PD7fEU2IhY/dt1Wom
Malware Config
Targets
-
-
Target
0156e735c5a7240f2a5ca52de79a020fabd1cae02ac7b406ce13b9e59119aceb
-
Size
11.6MB
-
MD5
bc2d0d2db3abf1547a20ecc2ef80ac02
-
SHA1
bd3175ceef88f3b715cea519ebd74ec5202fa99a
-
SHA256
0156e735c5a7240f2a5ca52de79a020fabd1cae02ac7b406ce13b9e59119aceb
-
SHA512
a85e40088090df4f167d323b6dbe357ee647d57c80e8fa96bcdf26a5b25fb5912eccd79abc2e3ed9b0e98ec4ff0284d3267aa2ee001cc7605123909c0b5c9b60
-
SSDEEP
196608:VNh64RGdML3MLjv+bhqNVoBPD7fEXEoY2Iv9jM2W1vk93Ii6SfiIU1Wom:ZUdML3cL+9qz8PD7fEU2IhY/dt1Wom
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-