General
-
Target
imglogger.exe
-
Size
15.1MB
-
Sample
240203-vhgdsaead8
-
MD5
f7885f6eb7f24c705673b2bc636aa37f
-
SHA1
30495fb2a2415a39e6cd42198d1281cbc0f85f1a
-
SHA256
f6200c2c6a783b91beda7c166c26e6f0755dec715dab2cac71cf102c9242892f
-
SHA512
bd2c356824f56164b17649fdc5cba30047359dbb4696b1c458e671a90573463fd636d1826d3c7bf78943b75c0ceaf8e320d6f385dde97c055f849c99ecbcf49f
-
SSDEEP
393216:U3iIE7YopTRk3meCcGfdYYM0G9bYXN9kIEuBUrfzA3/:T7rRRaY5FYYFWcXLh+zzAP
Behavioral task
behavioral1
Sample
imglogger.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
imglogger.exe
-
Size
15.1MB
-
MD5
f7885f6eb7f24c705673b2bc636aa37f
-
SHA1
30495fb2a2415a39e6cd42198d1281cbc0f85f1a
-
SHA256
f6200c2c6a783b91beda7c166c26e6f0755dec715dab2cac71cf102c9242892f
-
SHA512
bd2c356824f56164b17649fdc5cba30047359dbb4696b1c458e671a90573463fd636d1826d3c7bf78943b75c0ceaf8e320d6f385dde97c055f849c99ecbcf49f
-
SSDEEP
393216:U3iIE7YopTRk3meCcGfdYYM0G9bYXN9kIEuBUrfzA3/:T7rRRaY5FYYFWcXLh+zzAP
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-