General
-
Target
Crypto-Wallet-Cracker.zip
-
Size
2.1MB
-
Sample
240517-ccnlsscb31
-
MD5
27007434e55d58696a31774da2995259
-
SHA1
a5d61a17c5fe77f41a3956b68f03ce2c88b6c539
-
SHA256
cab725c00d00615e88d945ca3fd8442eefb7be71353901c801911b46a1295316
-
SHA512
69c3c31ad42d323d8aac762a2ae910eaf9f1724a3c183dfd62cb6be2af27c3dfc8e500c8d11dd2c64f8d47927da8aedda548dcb5646cbf1b5017c58486ab6374
-
SSDEEP
49152:YIy6ERB3CEM0l50lwIJACe86uNxTPxjSE20Vo/zsyqyEmNAj:7yDRoG5xSquvbpSOCzsTyEmNAj
Static task
static1
Behavioral task
behavioral1
Sample
Crypto Wallet Cracker 5.7/Crypto Wallet Cracker 5.7.msi
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Crypto Wallet Cracker 5.7/Crypto Wallet Cracker 5.7.msi
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Crypto Wallet Cracker 5.7/setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Crypto Wallet Cracker 5.7/setup.exe
Resource
win10v2004-20240426-en
Malware Config
Targets
-
-
Target
Crypto Wallet Cracker 5.7/Crypto Wallet Cracker 5.7.msi
-
Size
2.2MB
-
MD5
d079a25349110b85cbc324cc64313734
-
SHA1
48b97ebb5395e53cc5ac83668da6411189be76e7
-
SHA256
4549c2d57a976a63061881c6ccf1d76df24ad098d2b00cd5244c664338e8a0af
-
SHA512
d275a9d016320e83f70c36e5073918c9a11fd101caf965d1874ccb92b79fe2437d7f37b84e680e944512c13c04c8fc88f9c424805ac18bd070d9c1864466b3f3
-
SSDEEP
49152:5vfEt/7BQwwoPQ0lDY7+wJAeqquSNB/pLt6O26joXzY:dWQsDnGUSfRp6mizY
Score6/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
-
-
Target
Crypto Wallet Cracker 5.7/setup.exe
-
Size
542KB
-
MD5
486c49f2dd4e5683af1d047ffdfb5eeb
-
SHA1
d9101596b904fbd526cc11ba01f860b5bdd108f3
-
SHA256
091583602d7b6ef59fe5028c536ce89ea98d98c5c2b35cb09454f011478ed29c
-
SHA512
3ba696e559c700beb48f310c93beedd1110864df3f8b64da70f0a98adb1f1351e687d6f89c6b3c29a267a4d73a30a05bf8c0f6da3d751d81f04076343911fba5
-
SSDEEP
12288:mxrY9A/mSkf0FrgcdVm79QHpVEeMb01JQntLOC+Za:mpWA/mjf0s9QJVEem+
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-