General
-
Target
Dream Advanced.exe
-
Size
9.3MB
-
Sample
240621-b2bg4avejc
-
MD5
65e205345d28d4c2584339d86256050c
-
SHA1
09b44b17207b38069146b06aab82b184dc49f73a
-
SHA256
009a6d2909157654b073bd642d64a4129c4a4b5415a76b9cc2266862dfaa40c2
-
SHA512
84e28bf823a8a5dd64516dd1fcf1c30d936e43cf63275383d1746f26908a9f7c6cea651460a14f59a6950384adadcc873500542f8e27d6cbd7fb01ef4529d693
-
SSDEEP
196608:DrIEFItY+sJxZa0HthFhP2eN/FJMIDJf0gsAGK4RouAKPFb6a:KtLsJza0HJ9p/Fqyf0gstDAKB
Behavioral task
behavioral1
Sample
Dream Advanced.exe
Resource
win10v2004-20240508-es
Malware Config
Targets
-
-
Target
Dream Advanced.exe
-
Size
9.3MB
-
MD5
65e205345d28d4c2584339d86256050c
-
SHA1
09b44b17207b38069146b06aab82b184dc49f73a
-
SHA256
009a6d2909157654b073bd642d64a4129c4a4b5415a76b9cc2266862dfaa40c2
-
SHA512
84e28bf823a8a5dd64516dd1fcf1c30d936e43cf63275383d1746f26908a9f7c6cea651460a14f59a6950384adadcc873500542f8e27d6cbd7fb01ef4529d693
-
SSDEEP
196608:DrIEFItY+sJxZa0HthFhP2eN/FJMIDJf0gsAGK4RouAKPFb6a:KtLsJza0HJ9p/Fqyf0gstDAKB
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-