General
-
Target
Celestial.exe
-
Size
273KB
-
Sample
240310-p3s1esda29
-
MD5
7ca6a26751bd7ad90ffc2843f040117c
-
SHA1
5c2be81194456480f952d674c0513959eab0ceda
-
SHA256
c13b27db146974839ceeb088132e55627944f9a230392e4f8661749586a3626a
-
SHA512
0f16bbf19913c4c09a13ea48325a3751311941b2d6b11a70a97737628c53bd58b8009fa9439e3b0ce66ef0e46dc420a6535b2d8803cbf6669d024c3c4ea3b896
-
SSDEEP
6144:Of+BLtABPD7sBi/0QNE44FCpHoafTy/lI1D0NiJ:essK44FCpO61DzJ
Static task
static1
Behavioral task
behavioral1
Sample
Celestial.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
Celestial.exe
-
Size
273KB
-
MD5
7ca6a26751bd7ad90ffc2843f040117c
-
SHA1
5c2be81194456480f952d674c0513959eab0ceda
-
SHA256
c13b27db146974839ceeb088132e55627944f9a230392e4f8661749586a3626a
-
SHA512
0f16bbf19913c4c09a13ea48325a3751311941b2d6b11a70a97737628c53bd58b8009fa9439e3b0ce66ef0e46dc420a6535b2d8803cbf6669d024c3c4ea3b896
-
SSDEEP
6144:Of+BLtABPD7sBi/0QNE44FCpHoafTy/lI1D0NiJ:essK44FCpO61DzJ
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-