General
-
Target
StormLab.exe
-
Size
17.1MB
-
Sample
240211-yxpv9abb2z
-
MD5
f9b3595c5af5b703f6db357971b255be
-
SHA1
a6b0ea5f0786e27cf3f5f77989b7c1fed20dfa92
-
SHA256
fd1f60a5cf3be939a1bd01fd88e0aca5243b1c1336227b092ae0b64d4bacf929
-
SHA512
7ab31e854438dd937efb3df3b698eee4e62b305ff96788771a053411a0aad35a50c1beefb67ec6541ccac201552b2056adac339440b2b744ab80871f9232a891
-
SSDEEP
393216:liIE7YoPQJRHi+2ohcyLbdQuslSl99oWOv+9f+TWZXNfpg:K7rPQnHiRyc0bdQu9DorvS2T49p
Behavioral task
behavioral1
Sample
StormLab.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
StormLab.exe
-
Size
17.1MB
-
MD5
f9b3595c5af5b703f6db357971b255be
-
SHA1
a6b0ea5f0786e27cf3f5f77989b7c1fed20dfa92
-
SHA256
fd1f60a5cf3be939a1bd01fd88e0aca5243b1c1336227b092ae0b64d4bacf929
-
SHA512
7ab31e854438dd937efb3df3b698eee4e62b305ff96788771a053411a0aad35a50c1beefb67ec6541ccac201552b2056adac339440b2b744ab80871f9232a891
-
SSDEEP
393216:liIE7YoPQJRHi+2ohcyLbdQuslSl99oWOv+9f+TWZXNfpg:K7rPQnHiRyc0bdQu9DorvS2T49p
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-