General
-
Target
Ro-Booster-FPS.exe
-
Size
63.0MB
-
Sample
240624-vmpwqatbkc
-
MD5
c027816176fcb54b8b0ba7a6297bbc17
-
SHA1
e9f7fa474ccb1ca21fabf6b18a230a7c74998474
-
SHA256
7c30f4b73e8774145f4a49c6df6bce9db0d8ad03fd905e637ef5e910ff335553
-
SHA512
a67958e698a76bdc64d1d30f67e33e25440461df2343e6342859534e0d9765399a3af3e830043c3d19bb955e454408e3097b85854c5f7143680218cd7b2d5915
-
SSDEEP
786432:6p9/QwO7QqMoknvNpA+vIlo0FdGgrHxbjByTvnKvIjjk3ESWqEp+0/pWTPuxBNxx:U/Qw0QqMrlpA+Ql4WjDvIswqrS5nNxGY
Static task
static1
Behavioral task
behavioral1
Sample
Ro-Booster-FPS.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
Ro-Booster-FPS.exe
Resource
win10v2004-20240611-en
Malware Config
Targets
-
-
Target
Ro-Booster-FPS.exe
-
Size
63.0MB
-
MD5
c027816176fcb54b8b0ba7a6297bbc17
-
SHA1
e9f7fa474ccb1ca21fabf6b18a230a7c74998474
-
SHA256
7c30f4b73e8774145f4a49c6df6bce9db0d8ad03fd905e637ef5e910ff335553
-
SHA512
a67958e698a76bdc64d1d30f67e33e25440461df2343e6342859534e0d9765399a3af3e830043c3d19bb955e454408e3097b85854c5f7143680218cd7b2d5915
-
SSDEEP
786432:6p9/QwO7QqMoknvNpA+vIlo0FdGgrHxbjByTvnKvIjjk3ESWqEp+0/pWTPuxBNxx:U/Qw0QqMrlpA+Ql4WjDvIswqrS5nNxGY
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Hide Artifacts: Hidden Files and Directories
-