General
-
Target
ghdfg64.exe
-
Size
14.4MB
-
Sample
240120-yqzf4sgbd4
-
MD5
0dc7d0b6fd6bd2e157f3be4b6b20fe4d
-
SHA1
5784f5beb1cd3b5aa222aaf0484c52547d5759a5
-
SHA256
f16ca2056d872f1cae446a151e057fe1d5744f6f26889881050f254008c5a5b4
-
SHA512
8274ba73140c6c1b7005ae3fbc84f320e1e7181d12507518ba8a6854d02ceeecfca314378c8247e9bc30c85ecd4f159e15774f5fa2f8362a5911c14fd3c69160
-
SSDEEP
393216:qiIE7YoPQPdQuslSq99oWOv+9fg/kMeTl2Y:T7rPQPdQuSDorvSY/k/l
Behavioral task
behavioral1
Sample
ghdfg64.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
ghdfg64.exe
-
Size
14.4MB
-
MD5
0dc7d0b6fd6bd2e157f3be4b6b20fe4d
-
SHA1
5784f5beb1cd3b5aa222aaf0484c52547d5759a5
-
SHA256
f16ca2056d872f1cae446a151e057fe1d5744f6f26889881050f254008c5a5b4
-
SHA512
8274ba73140c6c1b7005ae3fbc84f320e1e7181d12507518ba8a6854d02ceeecfca314378c8247e9bc30c85ecd4f159e15774f5fa2f8362a5911c14fd3c69160
-
SSDEEP
393216:qiIE7YoPQPdQuslSq99oWOv+9fg/kMeTl2Y:T7rPQPdQuSDorvSY/k/l
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-