General
-
Target
setup.exe
-
Size
12.8MB
-
Sample
240203-a5ztesfdhm
-
MD5
a9034186fae73cf3398c5214cd450509
-
SHA1
dc34ab8995be10abd983243eedc4ff1d1382a08a
-
SHA256
7548bfc4fb9fa1e974e9b59ff8f712bd93608329b6126341e93d9e54f6e3311d
-
SHA512
55f7cccfcef365645caccb96dfa7495bb8a50de8ae7b31dec13a950c38056daa8a16c68d721f9b7d81b1f068564da0676de6e0d6d71adf953b889a4a595e55a7
-
SSDEEP
393216:du7L/5ArhQfukInEroXkakuIyzlu8pm8ZOLP/EJol72p:dCLxA1QmPErU1gyZ86K
Malware Config
Targets
-
-
Target
setup.exe
-
Size
12.8MB
-
MD5
a9034186fae73cf3398c5214cd450509
-
SHA1
dc34ab8995be10abd983243eedc4ff1d1382a08a
-
SHA256
7548bfc4fb9fa1e974e9b59ff8f712bd93608329b6126341e93d9e54f6e3311d
-
SHA512
55f7cccfcef365645caccb96dfa7495bb8a50de8ae7b31dec13a950c38056daa8a16c68d721f9b7d81b1f068564da0676de6e0d6d71adf953b889a4a595e55a7
-
SSDEEP
393216:du7L/5ArhQfukInEroXkakuIyzlu8pm8ZOLP/EJol72p:dCLxA1QmPErU1gyZ86K
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-