General
-
Target
Loader (1).exe
-
Size
16.4MB
-
Sample
240228-1gg7ksee76
-
MD5
c119e3f34a0f0085c82c20f60fb7efd3
-
SHA1
da7c25a95f7b1c4f185e9d8d86ac9435b3379eec
-
SHA256
39683e288e1052794d30c04455c0731c369a1efc2db61351f3f08959679cd579
-
SHA512
3bfd5a0cea9f08f9801834e0ba6c11605ac029360d06446e1f71e23fd30fef6a0e0d953a3b5beae067eafa5e8b92e4638bf81b1c055c3a66966fb1ae76243c65
-
SSDEEP
393216:7YiIE7YoSDn5ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e570A8K5TWCuVl:757rSDnRHUTLJSW+e5RLoztZ026e5QUW
Behavioral task
behavioral1
Sample
Loader (1).exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
Loader (1).exe
-
Size
16.4MB
-
MD5
c119e3f34a0f0085c82c20f60fb7efd3
-
SHA1
da7c25a95f7b1c4f185e9d8d86ac9435b3379eec
-
SHA256
39683e288e1052794d30c04455c0731c369a1efc2db61351f3f08959679cd579
-
SHA512
3bfd5a0cea9f08f9801834e0ba6c11605ac029360d06446e1f71e23fd30fef6a0e0d953a3b5beae067eafa5e8b92e4638bf81b1c055c3a66966fb1ae76243c65
-
SSDEEP
393216:7YiIE7YoSDn5ntpUTLfhJsW+eGQRCMTozGxu8C0ibfz6e570A8K5TWCuVl:757rSDnRHUTLJSW+e5RLoztZ026e5QUW
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-