General
-
Target
FnRtvAimbot.exe
-
Size
15.9MB
-
Sample
240131-zqn6taecdr
-
MD5
5b9b2a39d8413e9e4cc0e1351aff3659
-
SHA1
b8d73472ac3934134eb49ad02923369774aa1ebc
-
SHA256
fb4dc6f64b69baf75b3e8a5caf31a0839e16e2f8e8aebb0e55023559c412c1a4
-
SHA512
1f99dd36eec3615b338144c6e8ad2d2282076b7e8ca7df65094e3232223cd80a23efa369c346c58e3544515e6b7fb7cb4ad253e00064b949958ec6c9f750e483
-
SSDEEP
393216:UXGD2ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57R1bmXiWCNI:U2DaHUTLJSW+e5RLoztZ026e5TFVNI
Malware Config
Targets
-
-
Target
FnRtvAimbot.exe
-
Size
15.9MB
-
MD5
5b9b2a39d8413e9e4cc0e1351aff3659
-
SHA1
b8d73472ac3934134eb49ad02923369774aa1ebc
-
SHA256
fb4dc6f64b69baf75b3e8a5caf31a0839e16e2f8e8aebb0e55023559c412c1a4
-
SHA512
1f99dd36eec3615b338144c6e8ad2d2282076b7e8ca7df65094e3232223cd80a23efa369c346c58e3544515e6b7fb7cb4ad253e00064b949958ec6c9f750e483
-
SSDEEP
393216:UXGD2ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e57R1bmXiWCNI:U2DaHUTLJSW+e5RLoztZ026e5TFVNI
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-