General
-
Target
PEYSOHAVX.exe
-
Size
8.3MB
-
Sample
240603-lzj2kaag3t
-
MD5
491c23ecd3104bd6b27952da53d3ba38
-
SHA1
a29458cb6006528b1f1792dcd56ce631f0a2e332
-
SHA256
3c9105d0c851b8cba35908d00707e447198b04e85995e48c92077b2e7b24b9c0
-
SHA512
b72886c24b051441f187ce825ddbc5ca23afdf0650027a7519e40cac1131023efd71d561730a4f7232a21c40c5fa87ba7d75fed7221bc63d9cd5743925d7fd89
-
SSDEEP
196608:Mrzi0cDeTIE0OiLjv+bhqNVoBKUh8mz4Iv9Plu1D7A7:kieU4GL+9qz8/b4IzuRA7
Behavioral task
behavioral1
Sample
PEYSOHAVX.exe
Resource
win7-20240508-en
Malware Config
Targets
-
-
Target
PEYSOHAVX.exe
-
Size
8.3MB
-
MD5
491c23ecd3104bd6b27952da53d3ba38
-
SHA1
a29458cb6006528b1f1792dcd56ce631f0a2e332
-
SHA256
3c9105d0c851b8cba35908d00707e447198b04e85995e48c92077b2e7b24b9c0
-
SHA512
b72886c24b051441f187ce825ddbc5ca23afdf0650027a7519e40cac1131023efd71d561730a4f7232a21c40c5fa87ba7d75fed7221bc63d9cd5743925d7fd89
-
SSDEEP
196608:Mrzi0cDeTIE0OiLjv+bhqNVoBKUh8mz4Iv9Plu1D7A7:kieU4GL+9qz8/b4IzuRA7
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-