General
-
Target
MagnusNightV6.exe
-
Size
7.3MB
-
Sample
240529-npqsgadg57
-
MD5
9c6753dc5c8105888e74b8bbb1f3cb2b
-
SHA1
c0462a45240c90debfe879a4202b5041f4c9fa4c
-
SHA256
abadb91aef6f3f4f2dfdfaeb726fd86db82a9d5e31a2ff7749fd875baab67bfc
-
SHA512
9aba4119aa0dc9da8a8204ca181fae7d080c898e3aa31126f61b35e19cb3840eb25666b48d116da8c8389eae8c9017a27cd5441db45edc1ed18b8c6a03d2834f
-
SSDEEP
196608:krpkYS6bOshoKMuIkhVastRL5Di3uh1D7Jm:7YSuOshouIkPftRL54YRJm
Behavioral task
behavioral1
Sample
MagnusNightV6.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
MagnusNightV6.exe
-
Size
7.3MB
-
MD5
9c6753dc5c8105888e74b8bbb1f3cb2b
-
SHA1
c0462a45240c90debfe879a4202b5041f4c9fa4c
-
SHA256
abadb91aef6f3f4f2dfdfaeb726fd86db82a9d5e31a2ff7749fd875baab67bfc
-
SHA512
9aba4119aa0dc9da8a8204ca181fae7d080c898e3aa31126f61b35e19cb3840eb25666b48d116da8c8389eae8c9017a27cd5441db45edc1ed18b8c6a03d2834f
-
SSDEEP
196608:krpkYS6bOshoKMuIkhVastRL5Di3uh1D7Jm:7YSuOshouIkPftRL54YRJm
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-