General
-
Target
Steamplayer.exe
-
Size
7.4MB
-
Sample
240521-q72c2agc65
-
MD5
72469b438d7a4e3f2e16079b6f486af4
-
SHA1
a3249704930ccb652118399b1417019dbd97885e
-
SHA256
35cc370b5e82f78f5d4705d4e48874ffb2181330e8735bca9629ac8a27d7b472
-
SHA512
47e606c1b870fea19ffc56ca8d48058a64050882459c34af688de70fdf28999c3219c8ea7632505b940521531c52ef3eb1af7fb1947d8c5f8f9de46a1cc13c50
-
SSDEEP
98304:jPeYgI6OshoKyDvuIYc5AhV+gEc4kZvRLoI0EJfNA3z5UTbyv9JTSPhlVtQo1fO:j2YmOshoKMuIkhVastRL5Di3tKqSPJO
Behavioral task
behavioral1
Sample
Steamplayer.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
Steamplayer.exe
-
Size
7.4MB
-
MD5
72469b438d7a4e3f2e16079b6f486af4
-
SHA1
a3249704930ccb652118399b1417019dbd97885e
-
SHA256
35cc370b5e82f78f5d4705d4e48874ffb2181330e8735bca9629ac8a27d7b472
-
SHA512
47e606c1b870fea19ffc56ca8d48058a64050882459c34af688de70fdf28999c3219c8ea7632505b940521531c52ef3eb1af7fb1947d8c5f8f9de46a1cc13c50
-
SSDEEP
98304:jPeYgI6OshoKyDvuIYc5AhV+gEc4kZvRLoI0EJfNA3z5UTbyv9JTSPhlVtQo1fO:j2YmOshoKMuIkhVastRL5Di3tKqSPJO
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-