General
-
Target
ShadowTag.zip
-
Size
13.0MB
-
Sample
231130-m1jb4aah96
-
MD5
f619e58dfa3cc27aa5185c8ced1aea8d
-
SHA1
383e26a61c40f440ab8a4c3b4af50b54b5e4adb4
-
SHA256
c15849eb63a3f5d12e6cd7542d032d21a5494780708fe9166bcedd08cacb9aad
-
SHA512
65fd8a37c5aa4a6bbff93d26bb380746db9396e952bd05ed369b1ae6b72877dfd66be2be024016a25e00f7f0d1a0d58701267935dc350ed9e29d763f6f66e236
-
SSDEEP
393216:XCGMf20Hu0iH767kQ1S71Y5dg7qvhPjoULWB:ef5ulH7OkQEP0JLWB
Behavioral task
behavioral1
Sample
ShadowTag.exe
Resource
win7-20231023-en
Malware Config
Targets
-
-
Target
ShadowTag.exe
-
Size
13.2MB
-
MD5
a64a50d764de2af1e198bfd517eec2f3
-
SHA1
913b4cdc597642e4ac33e1a6526cd163f2bc29cb
-
SHA256
4cbea24a8641dc763864ffe8a2d4ebfa3d7ea5eb7280a25edc0b2e3d4c6cdde3
-
SHA512
efb92705d50713b06c208a308c0a8eee17c8b05c8622b0158c5974b89484739d2b48d96a860268d86afd5b51f715362542208a12b7e441c6d29d95d5ca3fa1a4
-
SSDEEP
393216:BiIE7Yo9+4ucW+eGQRJ9jo7BGcGmY/dt1Wom2:u7r9+RcW+e5RJ9Mgpm2
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-