General
-
Target
6f0ae2948a5926948e62bc3808f8a7342fded136c9f6ab03c8ebf07c16764239
-
Size
2.2MB
-
Sample
231121-yqagzsgd58
-
MD5
8d6fdddf2da3f650cb84d9fba3576490
-
SHA1
4bdac246bbb88657d78354bab845ce77314a4f72
-
SHA256
6f0ae2948a5926948e62bc3808f8a7342fded136c9f6ab03c8ebf07c16764239
-
SHA512
0f9fad15bf76ef19dd37613cc0b3291fe2bd51e5f78ce136c44d8d1a865a46ae3f480968ee1ee7a1d22121e9fc29831bf39e46441d776932aa789ec125ea5d26
-
SSDEEP
24576:PcXSj+7BUXULNkoP4tHmu6Fxmp6a9DhvhIQ4XVqSR9/55x4hf/r6ru:PuUXULNb4YF4p6a3v61gub4hf/qu
Static task
static1
Behavioral task
behavioral1
Sample
6f0ae2948a5926948e62bc3808f8a7342fded136c9f6ab03c8ebf07c16764239.exe
Resource
win7-20231020-en
Malware Config
Targets
-
-
Target
6f0ae2948a5926948e62bc3808f8a7342fded136c9f6ab03c8ebf07c16764239
-
Size
2.2MB
-
MD5
8d6fdddf2da3f650cb84d9fba3576490
-
SHA1
4bdac246bbb88657d78354bab845ce77314a4f72
-
SHA256
6f0ae2948a5926948e62bc3808f8a7342fded136c9f6ab03c8ebf07c16764239
-
SHA512
0f9fad15bf76ef19dd37613cc0b3291fe2bd51e5f78ce136c44d8d1a865a46ae3f480968ee1ee7a1d22121e9fc29831bf39e46441d776932aa789ec125ea5d26
-
SSDEEP
24576:PcXSj+7BUXULNkoP4tHmu6Fxmp6a9DhvhIQ4XVqSR9/55x4hf/r6ru:PuUXULNb4YF4p6a3v61gub4hf/qu
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-