General
-
Target
Oxlo (1).exe
-
Size
13.2MB
-
Sample
231118-3p8evagg8x
-
MD5
e01c259ea4e8e6f35479d26e40cf1a75
-
SHA1
361aa68bc5e5055a06e4d3689b8ba0612a595614
-
SHA256
4e5c5be9b02a4b49b74de6420c0f91d0e860b4bd9327fcd8f13dfff880dc25a7
-
SHA512
220e99ad2987c2f6c3ec2aab8c40656010bf40095ddd08457a2a87f1e6521a62cc2cd082ea89c1520eb40b0a498d4569823a04622920a82bb702d839539ffdaf
-
SSDEEP
393216:biIE7Yo9+4uOwKnwW+eGQRJ9jo7BGcGnaJKt/WorLu:I7r9+RONwW+e5RJ9MyprLu
Behavioral task
behavioral1
Sample
Oxlo (1).exe
Resource
win7-20231020-en
Malware Config
Targets
-
-
Target
Oxlo (1).exe
-
Size
13.2MB
-
MD5
e01c259ea4e8e6f35479d26e40cf1a75
-
SHA1
361aa68bc5e5055a06e4d3689b8ba0612a595614
-
SHA256
4e5c5be9b02a4b49b74de6420c0f91d0e860b4bd9327fcd8f13dfff880dc25a7
-
SHA512
220e99ad2987c2f6c3ec2aab8c40656010bf40095ddd08457a2a87f1e6521a62cc2cd082ea89c1520eb40b0a498d4569823a04622920a82bb702d839539ffdaf
-
SSDEEP
393216:biIE7Yo9+4uOwKnwW+eGQRJ9jo7BGcGnaJKt/WorLu:I7r9+RONwW+e5RJ9MyprLu
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-