General
-
Target
penis.exe
-
Size
18.2MB
-
Sample
231216-nfb8qabdak
-
MD5
7d4d56acb60cdedb31c8aa44be15e0d4
-
SHA1
3df1e1f5f56ac8831f4ff686ad5c901eb03057ed
-
SHA256
e2dae09576faee6f95557bc2637816f14d612c38a4d4efd0f22200b026fd66f6
-
SHA512
40495802422bb4b54838ff73e34650f68762da2bc5630a2fe97cb220c23550d6d805bc1b45734c50aed8aaa73c7ab2ae96471e77bcaab0953a383e3e8153e2d2
-
SSDEEP
393216:0iIE7Yo5/27QbpUTLfhJsW+eGQRU93iOblRS/PcLz9ikmlO6oCJdntE:N7r7dUTLJSW+e5R09BR+c1iL02
Behavioral task
behavioral1
Sample
penis.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
penis.exe
-
Size
18.2MB
-
MD5
7d4d56acb60cdedb31c8aa44be15e0d4
-
SHA1
3df1e1f5f56ac8831f4ff686ad5c901eb03057ed
-
SHA256
e2dae09576faee6f95557bc2637816f14d612c38a4d4efd0f22200b026fd66f6
-
SHA512
40495802422bb4b54838ff73e34650f68762da2bc5630a2fe97cb220c23550d6d805bc1b45734c50aed8aaa73c7ab2ae96471e77bcaab0953a383e3e8153e2d2
-
SSDEEP
393216:0iIE7Yo5/27QbpUTLfhJsW+eGQRU93iOblRS/PcLz9ikmlO6oCJdntE:N7r7dUTLJSW+e5R09BR+c1iL02
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-