General
-
Target
CelexV1.zip
-
Size
20.2MB
-
Sample
240312-wrag9shg49
-
MD5
04797f35bb835a3b7a128fd1a9fb06b7
-
SHA1
d12067e823ee8a8e86a798d05887cac22f49fbb7
-
SHA256
dd480e8cfd2c686f6d59aea4aadb4ef5e78876caf456413c615d31099937ec5d
-
SHA512
f084d0aa6de9c01386b5af93f201d95bd8c1cb243eb7d2a43c90322eacc9ae8afc86e6818ca1b1face4c440852b2137071d2bb7211240d62327d491314c58df1
-
SSDEEP
393216:s+zg9o0dTQgzb/5ScG9CbHUKPGKwewmHYX2ROpxSdeX:s+go0dT7DZaIHz+yg2yx8y
Behavioral task
behavioral1
Sample
Celex/Main/Celex.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
Celex/Main/Celex.exe
-
Size
20.4MB
-
MD5
67a2e11dc4cf10a250eb50db784ea577
-
SHA1
c04c51e6b72f7c681f34924599c81d270c37c183
-
SHA256
ff9931e23999793819ba51c3e422a4aa7b840408e8dd30b1f7d5a59029090b5a
-
SHA512
1be6cb58b901d7222fe7fbd98920ae20bde3503ea8f9672ed8e8bf961d41720b3149303c28c41770f5f896f872d416313c017c86e505d10881951828f942c724
-
SSDEEP
393216:0EkZQtsuNPG7NmiZoW1+TtIiFA/IFc2raodOKx3YV7:0hQtsUKEAl1QtIP/IHGo4e3c
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-