General
-
Target
soan.exe
-
Size
17.9MB
-
Sample
240202-xj1j6afbaq
-
MD5
635d67c69491f54b4eb2023bda710e40
-
SHA1
ba804971c0157a44976eb6f68807cea229003219
-
SHA256
0e74ad9b6f3e77c13cc818d7151403d85ed94d669157150ffe97d8d889c14b72
-
SHA512
46fdac407f01d9f1f3c444a2a1a47ce7a39fe60fb56044bcedd6f593c5f63a6ba8e5212973b6118031efd9b3afe824dabf600878e773bfe711ff971e0e668223
-
SSDEEP
393216:EqC2DlnfBfFZNRwSo67W+eGQRCMTozGxu8C0ibfz6eKk7M1bmXiWCNi:EcD1fBfFXR667W+e5RLoztZ026eKkiFi
Behavioral task
behavioral1
Sample
soan.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral2
Sample
creal.pyc
Resource
win10v2004-20231215-en
Malware Config
Targets
-
-
Target
soan.exe
-
Size
17.9MB
-
MD5
635d67c69491f54b4eb2023bda710e40
-
SHA1
ba804971c0157a44976eb6f68807cea229003219
-
SHA256
0e74ad9b6f3e77c13cc818d7151403d85ed94d669157150ffe97d8d889c14b72
-
SHA512
46fdac407f01d9f1f3c444a2a1a47ce7a39fe60fb56044bcedd6f593c5f63a6ba8e5212973b6118031efd9b3afe824dabf600878e773bfe711ff971e0e668223
-
SSDEEP
393216:EqC2DlnfBfFZNRwSo67W+eGQRCMTozGxu8C0ibfz6eKk7M1bmXiWCNi:EcD1fBfFXR667W+e5RLoztZ026eKkiFi
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
creal.pyc
-
Size
53KB
-
MD5
7c365f142ff15ab9662a4a21b4aa9efb
-
SHA1
c88c32070236f26f98175cc8cc24b0d973b41e42
-
SHA256
63434347837aeeca5032b77e84a30bebc3db89850110e0d28de864d46781d612
-
SHA512
f2fddbd832b1676118752749de7e9029546085adc930080b6fd0ddbe23f542b9040bce21471e3894971a8990fa367a9000e951538d12cd0dcef3f74987bfc3e3
-
SSDEEP
1536:2rEaqMamq3YwmQyLCipnml5ZOhLQmGwCo3gI:2w7MapmJpnDSoB
Score3/10 -