General
-
Target
Launcher.exe
-
Size
443KB
-
Sample
240614-zlfnwavgkg
-
MD5
aaa77d6928d24c74d686805fba1929a7
-
SHA1
42018920024096e5e8c2d2b70687c845502dd766
-
SHA256
3518948a80bee71bfb519041ae6f0e84f7656d222ebcd21f04416554af591d40
-
SHA512
41adaccabc42989372d64e953ee15579362227c0c71e6357e70defe240ebc6f75a7271d8644ce39606b6c61bd85e109d1df8fc8929c56ab32d311f60dd5208d4
-
SSDEEP
12288:UBygskMqMPijqnpQ7p25DlRfxiTF2yBl:UB0kbuijGQk
Static task
static1
Behavioral task
behavioral1
Sample
Launcher.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Launcher.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
Launcher.exe
-
Size
443KB
-
MD5
aaa77d6928d24c74d686805fba1929a7
-
SHA1
42018920024096e5e8c2d2b70687c845502dd766
-
SHA256
3518948a80bee71bfb519041ae6f0e84f7656d222ebcd21f04416554af591d40
-
SHA512
41adaccabc42989372d64e953ee15579362227c0c71e6357e70defe240ebc6f75a7271d8644ce39606b6c61bd85e109d1df8fc8929c56ab32d311f60dd5208d4
-
SSDEEP
12288:UBygskMqMPijqnpQ7p25DlRfxiTF2yBl:UB0kbuijGQk
Score7/10-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-