General
-
Target
EXT.exe
-
Size
17.2MB
-
Sample
240615-av97eawfjm
-
MD5
cc6f02b774b0961ceb94a8a4834ca04a
-
SHA1
13a71dda01a40c8c92c2414e88fa5fe5ad5e8f19
-
SHA256
0b3fcce21c7df51cd88bbfb9de77e17bafd85e8614b30d2f7fcb90624fd2e8c7
-
SHA512
f47882eebf1074940f7d8b2e236fc96feaa3aa5e143af77a1b98bdd57b65abcab42127830f0b65d42ffb63087e9e71503585d00e22dba645029d200c21573e8f
-
SSDEEP
393216:nEk/+4uSQUJWQsUcR4NzQW+eGQRe9jo7BGeiGH1mzrwrFeOC3MALY:n3+RnUYQFIW+e5Re9M/swraLY
Behavioral task
behavioral1
Sample
EXT.exe
Resource
win7-20240221-en
Malware Config
Targets
-
-
Target
EXT.exe
-
Size
17.2MB
-
MD5
cc6f02b774b0961ceb94a8a4834ca04a
-
SHA1
13a71dda01a40c8c92c2414e88fa5fe5ad5e8f19
-
SHA256
0b3fcce21c7df51cd88bbfb9de77e17bafd85e8614b30d2f7fcb90624fd2e8c7
-
SHA512
f47882eebf1074940f7d8b2e236fc96feaa3aa5e143af77a1b98bdd57b65abcab42127830f0b65d42ffb63087e9e71503585d00e22dba645029d200c21573e8f
-
SSDEEP
393216:nEk/+4uSQUJWQsUcR4NzQW+eGQRe9jo7BGeiGH1mzrwrFeOC3MALY:n3+RnUYQFIW+e5Re9M/swraLY
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-