General
-
Target
AutoDox.exe
-
Size
14.5MB
-
Sample
240510-by7q5aed46
-
MD5
3c4c29f2d567b20a7a95d64fb362c887
-
SHA1
e5e0437e756644dfddd7fa240f0453e81ba0ebcf
-
SHA256
4a057afcc17d079c4687fced9b5bf135b9e3502252846c1bd4d26c4fd8807940
-
SHA512
02621ce8dc804fedc5a3f0b6494f94fd95c7174e3a82101f2ff1d5476d14432a376c371f325c86f1b8f31d9fd0f6585765c625179edfa0316153c921ae854bd5
-
SSDEEP
393216:6xfdQuslN/m3pqq9AJ4ZoWOv+9fPV4aHJCI5ctyIk10:6RdQu4KhS4ZorvS3bCI50yIk10
Behavioral task
behavioral1
Sample
AutoDox.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
AutoDox.exe
-
Size
14.5MB
-
MD5
3c4c29f2d567b20a7a95d64fb362c887
-
SHA1
e5e0437e756644dfddd7fa240f0453e81ba0ebcf
-
SHA256
4a057afcc17d079c4687fced9b5bf135b9e3502252846c1bd4d26c4fd8807940
-
SHA512
02621ce8dc804fedc5a3f0b6494f94fd95c7174e3a82101f2ff1d5476d14432a376c371f325c86f1b8f31d9fd0f6585765c625179edfa0316153c921ae854bd5
-
SSDEEP
393216:6xfdQuslN/m3pqq9AJ4ZoWOv+9fPV4aHJCI5ctyIk10:6RdQu4KhS4ZorvS3bCI50yIk10
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-