General
-
Target
Petro_Spoofer_UD.exe
-
Size
16.9MB
-
Sample
240222-bbyjyaaa76
-
MD5
2f5015eeb3e9760fb760d2398dfb0f16
-
SHA1
2403b710998adc1fdde3ad227c111681b8d72585
-
SHA256
da133f815df4032869fae7b315019efbffe091b87c154a247bbdaa690aeb177a
-
SHA512
70e507d77a83d8ea8b3568bcd2c1d620530b1c4ea0605ca7cc6274d345c4f491691449c46d3db829f091e2bd793c04e978cb8e7c72f865340bf2b84a16fd3ee8
-
SSDEEP
393216:iEkZQND/vcqjmu0DbMXL2Vmd6m0RJVAzDak/ikznaIP6twmFN7t:ihQ9XXKcyVmd4DAvLpey617t
Behavioral task
behavioral1
Sample
Petro_Spoofer_UD.exe
Resource
win10-20240221-en
Malware Config
Targets
-
-
Target
Petro_Spoofer_UD.exe
-
Size
16.9MB
-
MD5
2f5015eeb3e9760fb760d2398dfb0f16
-
SHA1
2403b710998adc1fdde3ad227c111681b8d72585
-
SHA256
da133f815df4032869fae7b315019efbffe091b87c154a247bbdaa690aeb177a
-
SHA512
70e507d77a83d8ea8b3568bcd2c1d620530b1c4ea0605ca7cc6274d345c4f491691449c46d3db829f091e2bd793c04e978cb8e7c72f865340bf2b84a16fd3ee8
-
SSDEEP
393216:iEkZQND/vcqjmu0DbMXL2Vmd6m0RJVAzDak/ikznaIP6twmFN7t:ihQ9XXKcyVmd4DAvLpey617t
Score8/10-
Blocklisted process makes network request
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-