General
-
Target
StormLab_setup_5.2.8.exe
-
Size
17.2MB
-
Sample
240401-dhrfbacc44
-
MD5
c84ba7acd74c4fd0db833bb6e4d58a89
-
SHA1
ed81f8fb2a97688a7edbb062da0a3919dc6cc947
-
SHA256
2fb79ccffc743846213eb5c45e4c0eb6a79439769d5d53ae57459742440c8693
-
SHA512
07e20cb781725e0651154e322f27353fd1e44f1adc007cc4e0307fb32e45c7a88089d73547ee23b6a40e2a7b21298cc8701dca47b5147303067d6fbf5f72f0d0
-
SSDEEP
393216:WiIE7YoPQMRHi+2ohcyLbdQuslSl99oWOv+9f+wC4O2jTX6w:X7rPQKHiRyc0bdQu9DorvS2wC4RTr
Malware Config
Targets
-
-
Target
StormLab_setup_5.2.8.exe
-
Size
17.2MB
-
MD5
c84ba7acd74c4fd0db833bb6e4d58a89
-
SHA1
ed81f8fb2a97688a7edbb062da0a3919dc6cc947
-
SHA256
2fb79ccffc743846213eb5c45e4c0eb6a79439769d5d53ae57459742440c8693
-
SHA512
07e20cb781725e0651154e322f27353fd1e44f1adc007cc4e0307fb32e45c7a88089d73547ee23b6a40e2a7b21298cc8701dca47b5147303067d6fbf5f72f0d0
-
SSDEEP
393216:WiIE7YoPQMRHi+2ohcyLbdQuslSl99oWOv+9f+wC4O2jTX6w:X7rPQKHiRyc0bdQu9DorvS2wC4RTr
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-