General
-
Target
Beer.exe
-
Size
23.2MB
-
Sample
240203-qyccjsagb8
-
MD5
fdebe894eda4d5aad16943b0c79299ad
-
SHA1
b75eda0457f2dc943f06f0409e82b6d999751fb7
-
SHA256
abf3e1ee8c99bef5a705e8511fbbd28439491b09bf015ebe0d4e326c91fd822e
-
SHA512
dda8ad699d3fd7e4dbdf35491b92e3170aadb20ebd0ccfa17603cb8e68512ba9a2d23e26db17910e05209c72ea7cd588d35d2959fce5bd721d1a04dcf8e6593b
-
SSDEEP
393216:+iIE7YoPQtss27JwRW+eGQRj93iObIWRS/KYc2Pz21t/XYNk/yK3oLqIkPtFrCvE:/7rPQtsbwRW+e5RB9MWRljE+/YLKY1ns
Malware Config
Targets
-
-
Target
Beer.exe
-
Size
23.2MB
-
MD5
fdebe894eda4d5aad16943b0c79299ad
-
SHA1
b75eda0457f2dc943f06f0409e82b6d999751fb7
-
SHA256
abf3e1ee8c99bef5a705e8511fbbd28439491b09bf015ebe0d4e326c91fd822e
-
SHA512
dda8ad699d3fd7e4dbdf35491b92e3170aadb20ebd0ccfa17603cb8e68512ba9a2d23e26db17910e05209c72ea7cd588d35d2959fce5bd721d1a04dcf8e6593b
-
SSDEEP
393216:+iIE7YoPQtss27JwRW+eGQRj93iObIWRS/KYc2Pz21t/XYNk/yK3oLqIkPtFrCvE:/7rPQtsbwRW+e5RB9MWRljE+/YLKY1ns
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-