General
-
Target
Daily Claim.exe
-
Size
13.2MB
-
Sample
240228-dhl6lahh24
-
MD5
409e87f8771c8608e3ab31ecc1eb58a5
-
SHA1
987d8150b5b7cd0cbdf0ab20e3633666082dfd0f
-
SHA256
c94ecb268a02274d58417706b8ff0deddf21036a68c4ad692cdf43127905e541
-
SHA512
bfa93a5d04a1ecdac4d132e27b0885d062737804a5db717e648d81b2a22bfbf7102f0b44de8dc4f425c109196b32bf1a3151af69b71e7a3d63f5c11354e48ab3
-
SSDEEP
393216:TsiIE7Yop9dM/IS+DfDgrc6lAfVe5ef+G:Tl7rpT6IS+b0I9fI5ef
Behavioral task
behavioral1
Sample
Daily Claim.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Daily Claim.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Boobies.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Boobies.pyc
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
Daily Claim.exe
-
Size
13.2MB
-
MD5
409e87f8771c8608e3ab31ecc1eb58a5
-
SHA1
987d8150b5b7cd0cbdf0ab20e3633666082dfd0f
-
SHA256
c94ecb268a02274d58417706b8ff0deddf21036a68c4ad692cdf43127905e541
-
SHA512
bfa93a5d04a1ecdac4d132e27b0885d062737804a5db717e648d81b2a22bfbf7102f0b44de8dc4f425c109196b32bf1a3151af69b71e7a3d63f5c11354e48ab3
-
SSDEEP
393216:TsiIE7Yop9dM/IS+DfDgrc6lAfVe5ef+G:Tl7rpT6IS+b0I9fI5ef
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Boobies.pyc
-
Size
29KB
-
MD5
e6b6c704fe4a55e2bd73ee2888e2bfb2
-
SHA1
77e532787b7b56321e405a710e9f63895020298f
-
SHA256
d1f80380fe99d7d9a052f145c6abc1b7ce844ec040f967bc4d120aa6ea4b1a1a
-
SHA512
91582b076bdd4976de8bd51b7c54397f25025f4b6668c33c58936a9c8d269afffb124fa74f6ef4f7354ef994b2f0f20fb27b0cc779d0b744fd77e56dc2034156
-
SSDEEP
768:3+lVSpnrWWk/4VDiiyAuoGyXzPBfIfTVRWSrdbHsJ1Kh7C5r:30StrWqG3KDBfI5RgKh7Qr
Score3/10 -