General
-
Target
aimbotmta.exe
-
Size
17.3MB
-
Sample
240426-fkyzaaab63
-
MD5
044e0fdf6ea30aaf33d8f531ddc8de3d
-
SHA1
a53d7d12ea1c94973760b603877d754871eaec0b
-
SHA256
543716cf3dfbf699bdc25710643bb151cae95e3e12f0006b4adf279665469c27
-
SHA512
0bd9b03ab4973df45c9fd6ce06b0cb3252fbb0c795ba5800b6e56dd71412ac52d5b5fe4db807c13b22531a399f6af802c4e7081a4376d533fd54b54f95a06177
-
SSDEEP
393216:fEkFq5ZgP8AxYDX1+TtIiFvY9Z8D8Ccl6lq2tGtomGMtQS7LnwxgK:fNcZbX71QtI6a8DZcIlqFtdyEK
Behavioral task
behavioral1
Sample
aimbotmta.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
aimbotmta.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win10v2004-20240226-en
Malware Config
Targets
-
-
Target
aimbotmta.exe
-
Size
17.3MB
-
MD5
044e0fdf6ea30aaf33d8f531ddc8de3d
-
SHA1
a53d7d12ea1c94973760b603877d754871eaec0b
-
SHA256
543716cf3dfbf699bdc25710643bb151cae95e3e12f0006b4adf279665469c27
-
SHA512
0bd9b03ab4973df45c9fd6ce06b0cb3252fbb0c795ba5800b6e56dd71412ac52d5b5fe4db807c13b22531a399f6af802c4e7081a4376d533fd54b54f95a06177
-
SSDEEP
393216:fEkFq5ZgP8AxYDX1+TtIiFvY9Z8D8Ccl6lq2tGtomGMtQS7LnwxgK:fNcZbX71QtI6a8DZcIlqFtdyEK
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
creal.pyc
-
Size
64KB
-
MD5
aa0a24ec6cf426fbb7e1e2a2b37acb06
-
SHA1
10eb0400cb996edfa28b0bda63f564660151553e
-
SHA256
bf22490aa5ce5edb54e64d9156f8a2baae7fe8a9f03ed306f3f1b975d8933807
-
SHA512
798e0572fefe88ed33feaa9ebb4ad34dc58f85819aedd95983403970fc63b38dfe1bb4536e2d4b4350b4a00ac1db9a32b9585028970a8410fead8f510c9cf600
-
SSDEEP
1536:7Trye+0Ql9pObo8BHWfNXASFW08VAeOR2es:7T8Ybo8B21XASNMAeORk
Score3/10 -