General
-
Target
Spoofer.exe
-
Size
16.8MB
-
Sample
240409-cgqa7abb36
-
MD5
eb13941aa440f228923e0b8557408a96
-
SHA1
5a246d1ca2f712c6d67312e1fda196218a6b0de6
-
SHA256
2aad2a2097f6b6aa980121a5f394d7f0fad48b7e33198670e417c86a303ad59b
-
SHA512
010b3fc57054be6869916cde88bd3792669ab5d7bcadce78562564af373999df9ad7087b2cd261e0f2b437d2d572d7588b78ab0f934abce0ec823a5a5674e07a
-
SSDEEP
196608:iC0sKYu/PaQts1k4FMIZETSRjPePdrQJM96KbABLOqi8wC7hzYPOCl8de/yDMkfS:RQtseQETSRvJQnqOqi81zdCyd76
Malware Config
Targets
-
-
Target
Spoofer.exe
-
Size
16.8MB
-
MD5
eb13941aa440f228923e0b8557408a96
-
SHA1
5a246d1ca2f712c6d67312e1fda196218a6b0de6
-
SHA256
2aad2a2097f6b6aa980121a5f394d7f0fad48b7e33198670e417c86a303ad59b
-
SHA512
010b3fc57054be6869916cde88bd3792669ab5d7bcadce78562564af373999df9ad7087b2cd261e0f2b437d2d572d7588b78ab0f934abce0ec823a5a5674e07a
-
SSDEEP
196608:iC0sKYu/PaQts1k4FMIZETSRjPePdrQJM96KbABLOqi8wC7hzYPOCl8de/yDMkfS:RQtseQETSRvJQnqOqi81zdCyd76
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-