General
-
Target
main.exe
-
Size
20.3MB
-
Sample
240315-y6jqlaae5w
-
MD5
12205ecb734d315861ed3fd38aad872e
-
SHA1
508dfeaacc6c740213762b842bc13a9b6603b977
-
SHA256
15eaeb0e0a59752a04c5327b05df4900c4410be685708f3eb8bdc09894506424
-
SHA512
daa22c5af4e44f328bfb4ad8471df5d5608b6aa0a426e5aed71d747f25fd5931a07baa9dc9a9ba5d2a32ed78b5e73a2edb78ed1f95f68d38df7a0cd6e0049594
-
SSDEEP
393216:/B8ZZyEQetFHdw6ZZMV65EdAWXOQo1NTd0o/w3uCx+Qbx3ULKuuerTW:/B8Z0OX2AWX5o1td0v3FBbx3U+/GT
Malware Config
Targets
-
-
Target
main.exe
-
Size
20.3MB
-
MD5
12205ecb734d315861ed3fd38aad872e
-
SHA1
508dfeaacc6c740213762b842bc13a9b6603b977
-
SHA256
15eaeb0e0a59752a04c5327b05df4900c4410be685708f3eb8bdc09894506424
-
SHA512
daa22c5af4e44f328bfb4ad8471df5d5608b6aa0a426e5aed71d747f25fd5931a07baa9dc9a9ba5d2a32ed78b5e73a2edb78ed1f95f68d38df7a0cd6e0049594
-
SSDEEP
393216:/B8ZZyEQetFHdw6ZZMV65EdAWXOQo1NTd0o/w3uCx+Qbx3ULKuuerTW:/B8Z0OX2AWX5o1td0v3FBbx3U+/GT
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-