General
-
Target
693a1c35dd117816f92fc4acb491024c.bin
-
Size
7.3MB
-
Sample
231117-cdwc2aed3w
-
MD5
5ea3a0ae16cd7416882bcf75ac907a4c
-
SHA1
7acf071e1138c1f645ee7d50d39d37423d1e3126
-
SHA256
30064423b3c2adef035b9159c2ad7fb2650ec31e34358e7321a0ca2adabd6e2a
-
SHA512
874aa7e013d3bc30a2106ae8dc12ebbe47276b3efdf1b1b7e5e0acb00fcd876e33e611635ea5c8ca596a35e13b1d3406e01c2cbd47ecb0ee94e678148a34a8c6
-
SSDEEP
196608:Kye783hGVa1HX7nz+/1BosslFiHKJ5hO98L8YMEb:KyI83/lLz+/fAuHKPU9g8YMEb
Behavioral task
behavioral1
Sample
5772ac53f3ea00ee06f592ea27fe7f119f2027de5dcf72005a35a4302eb2d524.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
5772ac53f3ea00ee06f592ea27fe7f119f2027de5dcf72005a35a4302eb2d524.exe
-
Size
7.4MB
-
MD5
693a1c35dd117816f92fc4acb491024c
-
SHA1
604ad5b85fda7a52050fb07cb84225cd05d10fe2
-
SHA256
5772ac53f3ea00ee06f592ea27fe7f119f2027de5dcf72005a35a4302eb2d524
-
SHA512
bb82172fd87e92ffcb513ee465321445db615924c8414cac75c5fa90523419b1bc854b68c57da387455416a534a48d67eb280b43769307edddc33c0b5d85a5f4
-
SSDEEP
98304:gxeYgI6OshoKyDvuIYc5AhV+gEc4kZvRLoI0EJfNA3z5UTbVv9JTSPhlVtQo1fQ:gMYmOshoKMuIkhVastRL5Di3tKdSPJQ
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-