Resubmissions
19-04-2024 11:12
240419-naxmgaab94 10General
-
Target
BLTools_v2.9__PRO_.zip
-
Size
9.9MB
-
Sample
240419-naxmgaab94
-
MD5
da3006d8df49741a9f9927149df44aa9
-
SHA1
b1aff2369d9555a796945f614521a43d0a526a5b
-
SHA256
af2069fa9c086d6001a8950398afecb4759eba47bb61bcf8a76d3c6230217467
-
SHA512
56eec45706aa4be9386e94d0b1f72dfac83252a7fc421fe9bcb73d29e984ab6de2d2aefb0f2e3eba1f6adce0d055904f0717f64e5110ca7284f9bb9be9d33d05
-
SSDEEP
196608:KcbRU9MniZdA3D0yBI6t+tnZRUQdNFX6KlAUGkG3GlluFWccrVkm:KcViZ6LBVt+FFDmvGlQFW3um
Behavioral task
behavioral1
Sample
BLTools_v2.9__PRO_.zip
Resource
win10v2004-20240412-en
Malware Config
Targets
-
-
Target
BLTools_v2.9__PRO_.zip
-
Size
9.9MB
-
MD5
da3006d8df49741a9f9927149df44aa9
-
SHA1
b1aff2369d9555a796945f614521a43d0a526a5b
-
SHA256
af2069fa9c086d6001a8950398afecb4759eba47bb61bcf8a76d3c6230217467
-
SHA512
56eec45706aa4be9386e94d0b1f72dfac83252a7fc421fe9bcb73d29e984ab6de2d2aefb0f2e3eba1f6adce0d055904f0717f64e5110ca7284f9bb9be9d33d05
-
SSDEEP
196608:KcbRU9MniZdA3D0yBI6t+tnZRUQdNFX6KlAUGkG3GlluFWccrVkm:KcViZ6LBVt+FFDmvGlQFW3um
Score10/10-
Executes dropped EXE
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-