General
-
Target
boom3d.exe
-
Size
17.8MB
-
Sample
231201-qj2nwsab2w
-
MD5
2c606ee91c7e73451739362716c8c49c
-
SHA1
81e8d845e22766bbb8b5ab19520d456d8d5b6c17
-
SHA256
001da53f7a370d3d700c0369c61ee51c755f550456bb485912f26852064902b3
-
SHA512
b6b5f6ef383386102fab9b455cc557d4ae62bab0263b9b7f6d9bc8e9634b277afb595b83730be2b2f5410de073875f947bec99acf7af3e2c5e8b9148259d65b0
-
SSDEEP
393216:MMiIE7YoFr7M5liAdQuslEQ+l9RoWOv+9fa/5Z7enDnN6:q7rB7M5lndQubQGborvSi/59IDs
Malware Config
Targets
-
-
Target
boom3d.exe
-
Size
17.8MB
-
MD5
2c606ee91c7e73451739362716c8c49c
-
SHA1
81e8d845e22766bbb8b5ab19520d456d8d5b6c17
-
SHA256
001da53f7a370d3d700c0369c61ee51c755f550456bb485912f26852064902b3
-
SHA512
b6b5f6ef383386102fab9b455cc557d4ae62bab0263b9b7f6d9bc8e9634b277afb595b83730be2b2f5410de073875f947bec99acf7af3e2c5e8b9148259d65b0
-
SSDEEP
393216:MMiIE7YoFr7M5liAdQuslEQ+l9RoWOv+9fa/5Z7enDnN6:q7rB7M5lndQubQGborvSi/59IDs
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-