General
-
Target
2b76fb1f92833f9bdec15d5b6df8dbef946a554ff1c0db214e0bc14c1e503442
-
Size
172KB
-
Sample
240601-vg9c6shh29
-
MD5
e0e106aa3adc8d2a12e1bfeda48996f2
-
SHA1
4750e04a8622e3cd246122253182eb094743a2a5
-
SHA256
2b76fb1f92833f9bdec15d5b6df8dbef946a554ff1c0db214e0bc14c1e503442
-
SHA512
a2ef36cd5a73d412f1c66b557417458846d6849c2e2e39a404c680f67ee999dc6cca0f9d148b0f5df141e08977c6c3f4aedf095bed2517c79ed12abc473da599
-
SSDEEP
3072:iHwrxmMpvDITZg1SO5GWp1icKAArDZz4N9GhbkrNEk1xr:9rMZAp0yN90QEe
Static task
static1
Behavioral task
behavioral1
Sample
2b76fb1f92833f9bdec15d5b6df8dbef946a554ff1c0db214e0bc14c1e503442.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
https://quantumservers.com/assets',
Targets
-
-
Target
2b76fb1f92833f9bdec15d5b6df8dbef946a554ff1c0db214e0bc14c1e503442
-
Size
172KB
-
MD5
e0e106aa3adc8d2a12e1bfeda48996f2
-
SHA1
4750e04a8622e3cd246122253182eb094743a2a5
-
SHA256
2b76fb1f92833f9bdec15d5b6df8dbef946a554ff1c0db214e0bc14c1e503442
-
SHA512
a2ef36cd5a73d412f1c66b557417458846d6849c2e2e39a404c680f67ee999dc6cca0f9d148b0f5df141e08977c6c3f4aedf095bed2517c79ed12abc473da599
-
SSDEEP
3072:iHwrxmMpvDITZg1SO5GWp1icKAArDZz4N9GhbkrNEk1xr:9rMZAp0yN90QEe
Score10/10-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-