General
-
Target
StormLab.exe
-
Size
17.1MB
-
Sample
240302-ty6syaeh41
-
MD5
f9b3595c5af5b703f6db357971b255be
-
SHA1
a6b0ea5f0786e27cf3f5f77989b7c1fed20dfa92
-
SHA256
fd1f60a5cf3be939a1bd01fd88e0aca5243b1c1336227b092ae0b64d4bacf929
-
SHA512
7ab31e854438dd937efb3df3b698eee4e62b305ff96788771a053411a0aad35a50c1beefb67ec6541ccac201552b2056adac339440b2b744ab80871f9232a891
-
SSDEEP
393216:liIE7YoPQJRHi+2ohcyLbdQuslSl99oWOv+9f+TWZXNfpg:K7rPQnHiRyc0bdQu9DorvS2T49p
Behavioral task
behavioral1
Sample
StormLab.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
creal.pyc
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
StormLab.exe
-
Size
17.1MB
-
MD5
f9b3595c5af5b703f6db357971b255be
-
SHA1
a6b0ea5f0786e27cf3f5f77989b7c1fed20dfa92
-
SHA256
fd1f60a5cf3be939a1bd01fd88e0aca5243b1c1336227b092ae0b64d4bacf929
-
SHA512
7ab31e854438dd937efb3df3b698eee4e62b305ff96788771a053411a0aad35a50c1beefb67ec6541ccac201552b2056adac339440b2b744ab80871f9232a891
-
SSDEEP
393216:liIE7YoPQJRHi+2ohcyLbdQuslSl99oWOv+9f+TWZXNfpg:K7rPQnHiRyc0bdQu9DorvS2T49p
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
creal.pyc
-
Size
32KB
-
MD5
40507d100fc764701c9747f877667573
-
SHA1
6b920fcf88181e2fc9b482da7aee3a368d0c8823
-
SHA256
dfc136cd29c0c719d94cd7463ddce0f42d4a89aa3c5171737a4295851407d6e4
-
SHA512
06b3738e28e1db94746d66770fe4b31dc46a29ea0cb1b76cfafb13b1a2929759728224e31ea6ab291dd01ecfaffcd04b503c40ad969108525e10a576202f6f9a
-
SSDEEP
768:L8DnrRv2VsfNEiyAuAfKFMrRtfqtvEwS7bnjerAroaHDsIAvN8YC06X:IjrRze3aKFcfDwS7fOPviYD6X
Score3/10 -