General
-
Target
Lethal Company.exe
-
Size
17.1MB
-
Sample
240222-a4l6yahd3y
-
MD5
aa4136416c50a2f59b0b1b4f638e9035
-
SHA1
26c9ea02f1f0a20a1752d777a5e1d48cf8584d13
-
SHA256
6f8289f77c450d6d9c05580386643be30b262ed75fe5a23add3ffc03e08820c8
-
SHA512
e59f9b5aa2ba2ef1665e5bbaa0a21bacd3481d19dd43065437487a0dc1588e89ea104deaa5d5afa98d48108cfce9c983a0807caae4fe613521b529c947fcf1e8
-
SSDEEP
393216:Cu7L/sQ8qjmu0DbMjdQuslSl99oWOv+9fYMqLTG8:CCL0Q3KQdQu9DorvSAMe6
Malware Config
Targets
-
-
Target
Lethal Company.exe
-
Size
17.1MB
-
MD5
aa4136416c50a2f59b0b1b4f638e9035
-
SHA1
26c9ea02f1f0a20a1752d777a5e1d48cf8584d13
-
SHA256
6f8289f77c450d6d9c05580386643be30b262ed75fe5a23add3ffc03e08820c8
-
SHA512
e59f9b5aa2ba2ef1665e5bbaa0a21bacd3481d19dd43065437487a0dc1588e89ea104deaa5d5afa98d48108cfce9c983a0807caae4fe613521b529c947fcf1e8
-
SSDEEP
393216:Cu7L/sQ8qjmu0DbMjdQuslSl99oWOv+9fYMqLTG8:CCL0Q3KQdQu9DorvSAMe6
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-