General
-
Target
projectoyster.exe
-
Size
17.6MB
-
Sample
240619-rqq2easbkd
-
MD5
c2f6ec069ca587f732ee9107d9541ff4
-
SHA1
10a8985cc2f249ce143f97b26471426a95625ba2
-
SHA256
7fe09e5889787ae38ef8f5242811a60ebe1526314eb08cc184b7e47051815e2b
-
SHA512
b8c07ca5ece52fd6acc9a43d88216e6b57c0af908027099f0e2d3e48fcd19cbf4bde266c0cd3414233d0df2b7314fe801b12ee72804b31c5a7467f769f21e4d2
-
SSDEEP
393216:V5RM0d0EpEk/+4u8mwW+eGQRJ9jo7BGIGg3zOY:hMoDp3+RBwW+e5RJ9MnOY
Behavioral task
behavioral1
Sample
projectoyster.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
projectoyster.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
cstealer.pyc
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
cstealer.pyc
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
projectoyster.exe
-
Size
17.6MB
-
MD5
c2f6ec069ca587f732ee9107d9541ff4
-
SHA1
10a8985cc2f249ce143f97b26471426a95625ba2
-
SHA256
7fe09e5889787ae38ef8f5242811a60ebe1526314eb08cc184b7e47051815e2b
-
SHA512
b8c07ca5ece52fd6acc9a43d88216e6b57c0af908027099f0e2d3e48fcd19cbf4bde266c0cd3414233d0df2b7314fe801b12ee72804b31c5a7467f769f21e4d2
-
SSDEEP
393216:V5RM0d0EpEk/+4u8mwW+eGQRJ9jo7BGIGg3zOY:hMoDp3+RBwW+e5RJ9MnOY
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
cstealer.pyc
-
Size
67KB
-
MD5
380fb181fbfee35d71f14e2d1a1df1c7
-
SHA1
f991d3803a6ac70bd017175e289c95d52a3808ca
-
SHA256
62efea82da680bd54e4917cca7553c9bf1ce6a7290df986d612115dd9df683b7
-
SHA512
393c1b167eeaa3007282f78744dc197fab35cd0502ebd9de171e9006dae92f61a6001ae53ff62e135480fc689ea3427928cba559bdd0291cf20c311a05d44572
-
SSDEEP
1536:l0xqOgPtxpqBJlMstbo88jLQQcXf9qS0Vr+LRheF:lqQt/+bo88PiXX0r+LRA
Score3/10 -