General
-
Target
Copy_Server.exe
-
Size
17.0MB
-
Sample
240429-z9bd3acf51
-
MD5
c22ec0781c1039f0dcac6604ddd2cd16
-
SHA1
6adb6d849499ef8b13bf6dc1e1f399623eb6502d
-
SHA256
1f0b5bf2acb3d65094bad84bed510dde2981d43adb1dd1753d7616234be434b4
-
SHA512
08fcab486f47d1019286cf35db903a771377561d69a3e1ad23342398be3032e2d457c7dd55a2fb32ee6974a248378d590c4ddda30bab8f8799feb79a8ac15fae
-
SSDEEP
393216:aWHiIE7YoPQK9dM/IS+DfDgrc6ZczfnDfuF:Dc7rPQKT6IS+b0IBzfDf
Behavioral task
behavioral1
Sample
Copy_Server.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
Copy_Server.exe
-
Size
17.0MB
-
MD5
c22ec0781c1039f0dcac6604ddd2cd16
-
SHA1
6adb6d849499ef8b13bf6dc1e1f399623eb6502d
-
SHA256
1f0b5bf2acb3d65094bad84bed510dde2981d43adb1dd1753d7616234be434b4
-
SHA512
08fcab486f47d1019286cf35db903a771377561d69a3e1ad23342398be3032e2d457c7dd55a2fb32ee6974a248378d590c4ddda30bab8f8799feb79a8ac15fae
-
SSDEEP
393216:aWHiIE7YoPQK9dM/IS+DfDgrc6ZczfnDfuF:Dc7rPQKT6IS+b0IBzfDf
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-