General
-
Target
Silence_v4.1.exe
-
Size
7.4MB
-
Sample
240524-t3139aca8y
-
MD5
48b06f94db083960d359ce33819e7231
-
SHA1
c66449c54bf2a2ff1477699823edbdb4b034f0c0
-
SHA256
a51e8d6617f70f2db4a475514a93a558b791ec8680266c6c4cfd0d40545ce142
-
SHA512
8ab275843655fb738861b55e66be7b0c2301d0ab97621e91db94cdbb95cbf14892a59fa48d1d17a91f3fcd330a24a7c75c9815d42a56aa01d5c35a96cdda6691
-
SSDEEP
196608:urVW0cDEVLjv+bhqNVoBKUh8mz4Iv9PbruQdz:AiEtL+9qz8/b4Ituiz
Behavioral task
behavioral1
Sample
Silence_v4.1.exe
Resource
win7-20240419-en
Malware Config
Targets
-
-
Target
Silence_v4.1.exe
-
Size
7.4MB
-
MD5
48b06f94db083960d359ce33819e7231
-
SHA1
c66449c54bf2a2ff1477699823edbdb4b034f0c0
-
SHA256
a51e8d6617f70f2db4a475514a93a558b791ec8680266c6c4cfd0d40545ce142
-
SHA512
8ab275843655fb738861b55e66be7b0c2301d0ab97621e91db94cdbb95cbf14892a59fa48d1d17a91f3fcd330a24a7c75c9815d42a56aa01d5c35a96cdda6691
-
SSDEEP
196608:urVW0cDEVLjv+bhqNVoBKUh8mz4Iv9PbruQdz:AiEtL+9qz8/b4Ituiz
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-