General
-
Target
slotted_DO_NOT_LEAK_LOADER.rar
-
Size
8.0MB
-
Sample
240324-fgdh6sce5s
-
MD5
a7804bf3bf7a47566ec0f05625940687
-
SHA1
8172737195dccab632224c333f6b70db8904e8fa
-
SHA256
60eadf810d1795222cbafba0180affe1cf65cc22a565a321102b471b6903eaf1
-
SHA512
eaa2a7908f6cb6de9c830ae4efa685624960ddc991d2178142b70fc84acf6451bc8f970105be774ebfbecfcc57d38c8ab1e4e9a42257c195b7fb0d1e73c15dd0
-
SSDEEP
196608:7EIIN3ruklDH2CPWDxxO9Hcrbhvj2UEh5s8uMvHTQfgo92skMazlb:7E3hbVPWdg9HcrbljsvHpossXa9
Behavioral task
behavioral1
Sample
yeno slotted so sexyyyyyyy.exe
Resource
win7-20231129-en
Malware Config
Targets
-
-
Target
yeno slotted so sexyyyyyyy.exe
-
Size
8.2MB
-
MD5
def8840241246f7ffd84e685fd112df0
-
SHA1
0fe476723a584a4af31db476916b6b7b7103ced6
-
SHA256
677d8b0da2b7f4df529b45f5546b4778ee052f8deaa55972690078547e111fd7
-
SHA512
de06a20842be32d8a14fd8861d6f141f74055f736660899fec3f792115f9a76b41252ce4381b4cd1ccc3f41f7925f1fdb7a7ce982438c100b9a1f94ac88bd560
-
SSDEEP
196608:fjP+sxfN+/urErvI9pWjgU1DEzx7sKL/s1tySEQAkjUWlRH2WR:7XxfE/urEUWjhEhn01tv392WR
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-