General
-
Target
Cromus.exe
-
Size
8.3MB
-
Sample
240617-f8rvwawfrd
-
MD5
3766382dff0264991bd5d6b7571e1697
-
SHA1
54a4a206a24f0ea474797d2541e960689e4943b6
-
SHA256
6c9b9da8e7e6a040ab476d8b05aead171cda1e86a616723fefbd0488b2396f0b
-
SHA512
e0883505053ade93a013bc582cea29de9be8f19cafa2fd021a5a128fef8513d05899eccd6a38a28409a6779e02c8fba05c9a38e1c0ab3df3bcfa2b9b01eaab74
-
SSDEEP
196608:WwUu78K/1+/dQmRJ8dA6l7aycBIGpEGo6hTOv+QKf+bQlRMbTc:tUu7L/edQusl29foWOv+9f
Behavioral task
behavioral1
Sample
Cromus.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
Cromus.exe
Resource
win11-20240508-en
Behavioral task
behavioral3
Sample
cstealer.pyc
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
cstealer.pyc
Resource
win11-20240508-en
Malware Config
Targets
-
-
Target
Cromus.exe
-
Size
8.3MB
-
MD5
3766382dff0264991bd5d6b7571e1697
-
SHA1
54a4a206a24f0ea474797d2541e960689e4943b6
-
SHA256
6c9b9da8e7e6a040ab476d8b05aead171cda1e86a616723fefbd0488b2396f0b
-
SHA512
e0883505053ade93a013bc582cea29de9be8f19cafa2fd021a5a128fef8513d05899eccd6a38a28409a6779e02c8fba05c9a38e1c0ab3df3bcfa2b9b01eaab74
-
SSDEEP
196608:WwUu78K/1+/dQmRJ8dA6l7aycBIGpEGo6hTOv+QKf+bQlRMbTc:tUu7L/edQusl29foWOv+9f
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
cstealer.pyc
-
Size
39KB
-
MD5
a03051426842272fcd6c500a75261f00
-
SHA1
eccccb727231f70bcf942719bc58d652cb2436e5
-
SHA256
ef2d73bcc0b022493059e1bd7ed21ef56ed39d087a1dc7712bdca3388d37da3d
-
SHA512
01a43f6e01ee9d6929a2853395a06f51cc094ad0601a34fb50cc7ce63bbbeb6341108b6582c162f1af7d07ba538f2ea6cf94d7bbce103113b58269688f7dd09a
-
SSDEEP
768:fuqejHJUc4k17WnMAF+5JsylM3jprKBBbxoZUM4PqVfqrY9Wygqxie3HrKl4HYiF:d4ph4kW+JsyC3F6OUM6qVirY9WygWiMP
Score3/10 -