General
-
Target
dx9.exe
-
Size
16.6MB
-
Sample
240525-saj4lagg62
-
MD5
73c79a827664c524980f8091331bc214
-
SHA1
588ca896dc941b9772c78c40a5a8dd6e10f460c3
-
SHA256
dffba69b5e90e2b7972b960e1622759abf1f295f11b641c1970d56132f4fed56
-
SHA512
577ae52627692358c5f422ae1b0cf81b2065f31fd05f95f1dd8b27f361df1ea414122deef179c5a307ba918aecd7544d85b0728bf758aa8f329fc4e3ed3397e5
-
SSDEEP
196608:hhSLEkv0sKYu/PaQtsI9OL4FMIZETSRjPePdrQJM9WKbAB/rOQjznPOzx5dy/ysW:sEkZQtsTQETSRvJQ7MrLzG/dSmv/
Behavioral task
behavioral1
Sample
dx9.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
cstealer.pyc
Resource
win10-20240404-en
Malware Config
Targets
-
-
Target
dx9.exe
-
Size
16.6MB
-
MD5
73c79a827664c524980f8091331bc214
-
SHA1
588ca896dc941b9772c78c40a5a8dd6e10f460c3
-
SHA256
dffba69b5e90e2b7972b960e1622759abf1f295f11b641c1970d56132f4fed56
-
SHA512
577ae52627692358c5f422ae1b0cf81b2065f31fd05f95f1dd8b27f361df1ea414122deef179c5a307ba918aecd7544d85b0728bf758aa8f329fc4e3ed3397e5
-
SSDEEP
196608:hhSLEkv0sKYu/PaQtsI9OL4FMIZETSRjPePdrQJM9WKbAB/rOQjznPOzx5dy/ysW:sEkZQtsTQETSRvJQ7MrLzG/dSmv/
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
cstealer.pyc
-
Size
75KB
-
MD5
5439ffd9b4954896b05b13d9a54ec999
-
SHA1
cce6a497faa806d3cb2f3fb10e26e34ea33729b6
-
SHA256
d5d9c56e01e0275793489d298b7880548ed357e50767492e369bd5b622318e10
-
SHA512
baecb6b5cff7ae658d8472bac0985c956f2432afb6cc1b338663c6f71731ec0e28ec1ba3bdc7092c29f64d27c2e02232cf51453bd3b60e2ecdb745e3549463a2
-
SSDEEP
1536:DvIiOtb253vkwsJlYaa2Is8qRai+joMFpuP4grrRheEX:DvQW9t2Is8H6MeP4grrRnX
Score3/10 -