General
-
Target
injector.exe
-
Size
8.2MB
-
Sample
240522-z56z6sha8z
-
MD5
698c9719289f60f75e9ef0bbbb30095e
-
SHA1
a63608483dd847f4ea00ccd43f94f05444716fde
-
SHA256
199b646baa3584624411f6dce79e3ec648dce21ae78ae5b4b490785fa4fc2f63
-
SHA512
484a8816c10ecb4bd3c8b894f7e9b1b7a2327fc7355fcefd7a8c704adedb7c724b51905259117ac2cf51c5753c3b92766459e4481452a4666f157805b8fa6af2
-
SSDEEP
196608:UrH8vEzpCuLjv+bhqNVoB8Ck5c7GpNlpq41J2mrlvbk9qtlDfqWi:H4NL+9qz88Ck+7q3p91JNMqfqWi
Behavioral task
behavioral1
Sample
injector.exe
Resource
win7-20240215-en
Malware Config
Targets
-
-
Target
injector.exe
-
Size
8.2MB
-
MD5
698c9719289f60f75e9ef0bbbb30095e
-
SHA1
a63608483dd847f4ea00ccd43f94f05444716fde
-
SHA256
199b646baa3584624411f6dce79e3ec648dce21ae78ae5b4b490785fa4fc2f63
-
SHA512
484a8816c10ecb4bd3c8b894f7e9b1b7a2327fc7355fcefd7a8c704adedb7c724b51905259117ac2cf51c5753c3b92766459e4481452a4666f157805b8fa6af2
-
SSDEEP
196608:UrH8vEzpCuLjv+bhqNVoB8Ck5c7GpNlpq41J2mrlvbk9qtlDfqWi:H4NL+9qz88Ck+7q3p91JNMqfqWi
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-