General
-
Target
release.exe
-
Size
5.9MB
-
Sample
240522-alt4tsee77
-
MD5
6d46969ab9ba73f9c14cb57c8911f492
-
SHA1
f65f0a1aa15eaec933b320fd0f6bdc59535f6d28
-
SHA256
2edfd48c7fc7f707fe235d05551b61a882296b5b9097e79823219bc0cde8f90a
-
SHA512
f93a65d80ca72813e0381e4c014e7f1ac913e1cdff652ce0fa1511cf24c87e33d2011ff6b05fe3f65341355c7c20704196bd4510f5357bf40a079dc1abf8ea82
-
SSDEEP
98304:WrOVmoDUN43WlaEjjOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6aBn4:WrOVumWzOjmFwDRxtYSHdK34kdai7bNp
Behavioral task
behavioral1
Sample
release.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
release.exe
-
Size
5.9MB
-
MD5
6d46969ab9ba73f9c14cb57c8911f492
-
SHA1
f65f0a1aa15eaec933b320fd0f6bdc59535f6d28
-
SHA256
2edfd48c7fc7f707fe235d05551b61a882296b5b9097e79823219bc0cde8f90a
-
SHA512
f93a65d80ca72813e0381e4c014e7f1ac913e1cdff652ce0fa1511cf24c87e33d2011ff6b05fe3f65341355c7c20704196bd4510f5357bf40a079dc1abf8ea82
-
SSDEEP
98304:WrOVmoDUN43WlaEjjOjFgFEblNHYSxTpirSHcUR43zrwkdA8QJCKC7bN3mb6aBn4:WrOVumWzOjmFwDRxtYSHdK34kdai7bNp
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-