General
-
Target
Kegelwoofer.exe
-
Size
16.4MB
-
Sample
240202-11pqrsghg7
-
MD5
c119e3f34a0f0085c82c20f60fb7efd3
-
SHA1
da7c25a95f7b1c4f185e9d8d86ac9435b3379eec
-
SHA256
39683e288e1052794d30c04455c0731c369a1efc2db61351f3f08959679cd579
-
SHA512
3bfd5a0cea9f08f9801834e0ba6c11605ac029360d06446e1f71e23fd30fef6a0e0d953a3b5beae067eafa5e8b92e4638bf81b1c055c3a66966fb1ae76243c65
-
SSDEEP
393216:7YiIE7YoSDn5ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e570A8K5TWCuVl:757rSDnRHUTLJSW+e5RLoztZ026e5QUW
Behavioral task
behavioral1
Sample
Kegelwoofer.exe
Resource
win11-20231215-en
Behavioral task
behavioral2
Sample
Creal.pyc
Resource
win11-20231215-en
Malware Config
Targets
-
-
Target
Kegelwoofer.exe
-
Size
16.4MB
-
MD5
c119e3f34a0f0085c82c20f60fb7efd3
-
SHA1
da7c25a95f7b1c4f185e9d8d86ac9435b3379eec
-
SHA256
39683e288e1052794d30c04455c0731c369a1efc2db61351f3f08959679cd579
-
SHA512
3bfd5a0cea9f08f9801834e0ba6c11605ac029360d06446e1f71e23fd30fef6a0e0d953a3b5beae067eafa5e8b92e4638bf81b1c055c3a66966fb1ae76243c65
-
SSDEEP
393216:7YiIE7YoSDn5ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e570A8K5TWCuVl:757rSDnRHUTLJSW+e5RLoztZ026e5QUW
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Creal.pyc
-
Size
48KB
-
MD5
067f13649b2c6431ee07f56da4235c4b
-
SHA1
ff56d266068185eaf75a8c54d8e8c52e55bea436
-
SHA256
f6f7b18bcff6b517718151d6caf9930e5f33301a928e8d81dbe6354101c7cb58
-
SHA512
53b611fa3b6bab7a31134de700305ed1e8e89d6c488d6a04d2114052476ef5a4303efd9bcd3f23e315806672fe65b1834dc53bc8a78e8395d811007bba7a3956
-
SSDEEP
768:PpFnrAya7K+aTMdcmrVWwzO/phReWdXEXuGtz07VOZZ4GQmGw8jt4xMao3Q1:/rTaqMamgphoWdUeOPZZ4GQmGwWaoA
Score3/10 -