General
-
Target
MethodReveal.exe
-
Size
7.7MB
-
Sample
240603-lx5v9abh86
-
MD5
f0fdcba521fda1be3007670423954249
-
SHA1
d42ae34e8d15a5759b1444d37d3eac510a0cde4d
-
SHA256
6bd45a7022878713fc90229c9670a0de5d3fb1addc623acab8f57b94e3fe16ad
-
SHA512
78e4400c9b0cde9f0415a4f6018a781586381b55b5650842d7754309f4ec7132a0bcc002c7bda7b4cae4f688a04d0441b12253957e840af2f2774e117100cbfc
-
SSDEEP
98304:iRgzHqdVfB2T0S27wYpFyuT/9vUIdD9C+z3zO917vOTh+ezDNhCSpXq4JvmJ1nm8:i2QsTqpFbT/9bvLz3S1bA3zCSEpn97YI
Behavioral task
behavioral1
Sample
MethodReveal.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
MethodReveal.exe
-
Size
7.7MB
-
MD5
f0fdcba521fda1be3007670423954249
-
SHA1
d42ae34e8d15a5759b1444d37d3eac510a0cde4d
-
SHA256
6bd45a7022878713fc90229c9670a0de5d3fb1addc623acab8f57b94e3fe16ad
-
SHA512
78e4400c9b0cde9f0415a4f6018a781586381b55b5650842d7754309f4ec7132a0bcc002c7bda7b4cae4f688a04d0441b12253957e840af2f2774e117100cbfc
-
SSDEEP
98304:iRgzHqdVfB2T0S27wYpFyuT/9vUIdD9C+z3zO917vOTh+ezDNhCSpXq4JvmJ1nm8:i2QsTqpFbT/9bvLz3S1bA3zCSEpn97YI
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-