General
-
Target
RC7.exe
-
Size
13.2MB
-
Sample
240111-y1ejpaffbq
-
MD5
befb565fe5a30f70e2dc55b065edd766
-
SHA1
68116934bf8f03bfd8c75f1f9640d560cd110994
-
SHA256
6b8fd61dd368291bc6f14ced7fd0530d7cb8f3b769ee1964798515a0b1d43864
-
SHA512
ba34e9f1b6b77d1544182c90f8baef2432a9540696e55fb4d96cae193f9b69b1c35920264b85b72831c869df9e2cb5e5e0d4a4f9ee2011ff8719bc8fc9be89c7
-
SSDEEP
393216:3XGD2nwW+eGQRIMTozGxu8C0ibfz6e57g1bmXiWCUI:32DawW+e5R5oztZ026e5WFVUI
Malware Config
Targets
-
-
Target
RC7.exe
-
Size
13.2MB
-
MD5
befb565fe5a30f70e2dc55b065edd766
-
SHA1
68116934bf8f03bfd8c75f1f9640d560cd110994
-
SHA256
6b8fd61dd368291bc6f14ced7fd0530d7cb8f3b769ee1964798515a0b1d43864
-
SHA512
ba34e9f1b6b77d1544182c90f8baef2432a9540696e55fb4d96cae193f9b69b1c35920264b85b72831c869df9e2cb5e5e0d4a4f9ee2011ff8719bc8fc9be89c7
-
SSDEEP
393216:3XGD2nwW+eGQRIMTozGxu8C0ibfz6e57g1bmXiWCUI:32DawW+e5R5oztZ026e5WFVUI
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-