General
-
Target
Domashka.7z
-
Size
7.3MB
-
Sample
240103-prfkysfef9
-
MD5
ea3be0965ada906ae4d7fec3c53b7c9e
-
SHA1
37273b2b1b3c622b61fb6db273e3c21fb5967e62
-
SHA256
b67650cdc6cf635ca616302f292c2054fb51739b8a59dc81f3f1ca69f43b0f04
-
SHA512
cd580d11d75be92440cbfdd5e9df98ecc27780aa8c81c6072645e09cb13fcdc3609e05fdf13ed133bdbc868112c5865640906aa0a11027ce9729502340f1e619
-
SSDEEP
196608:aB9nzcP0ruW/e/nNsgRdKXdnR+Lc/ctHZfY7KSl2S/VOL:aByiuW/QnNsgXEnGcW5fmKh4Vy
Static task
static1
Behavioral task
behavioral1
Sample
Domashka.exe
Resource
win11-20231215-en
Malware Config
Extracted
blackguard
https://api.telegram.org/bot6694446290:AAHhatGdMQTZc2j8T6IAfes0OfC6QMBYYSg/sendMessage?chat_id=6485360129
Targets
-
-
Target
Domashka.exe
-
Size
7.7MB
-
MD5
86e863875266e8345097c29d15741a8b
-
SHA1
ab5524d7f698de5928397f3506645ba952103e4a
-
SHA256
bb5d7edc909a7ea29836a501dddd5244d33d342ec6f75c1cf201f14ed55802ac
-
SHA512
22528bbe743825dbfb09743d2824ad5220125e3240bd4d0bd2f87bdc7d46a259aebc08a6fc2e75d6119d881742348fcde90e05142eaa4f29d9c2bbe88f2ae8d5
-
SSDEEP
196608:lX5lladq1hZvawTVNi1Fg6rTSGRzyEjNoi5d7nWO7:lHq6vFTIFg63R5j2E7nWG
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-