General
-
Target
trolled.exe
-
Size
4.3MB
-
Sample
240628-dx96za1flk
-
MD5
e24cc98957c91dabed02cf84e47b8278
-
SHA1
00607cff2e6d37b6f271f5e5f8794024814722ee
-
SHA256
6f819a3dbe5ac75261f157c14035baf0f72bf93033c12e581def1a4cdf9f8039
-
SHA512
aafca528c9ca2f4e756df04e0b95862cd872b712fe5c3138752d9f65de90f340423d7bab976d9c6a1d890118c720026a9d8b9a229d4dee78dc02d6595f31cc41
-
SSDEEP
98304:pIgu5JSgwY2bb+YIqdhoBmoziggpNamZTHwwYFiFN:pVu/SSE6YboBmo23KmZTHwwN
Static task
static1
Behavioral task
behavioral1
Sample
trolled.exe
Resource
win7-20240220-en
Malware Config
Extracted
skuld
https://discord.com/api/webhooks/1256063120926052463/-iFGknjVKFXSNv3DZWbEqQQxHdmFRgLmT1KDCJ79ELk0eZPk3sQv7UfngRseF16uBUN5
Targets
-
-
Target
trolled.exe
-
Size
4.3MB
-
MD5
e24cc98957c91dabed02cf84e47b8278
-
SHA1
00607cff2e6d37b6f271f5e5f8794024814722ee
-
SHA256
6f819a3dbe5ac75261f157c14035baf0f72bf93033c12e581def1a4cdf9f8039
-
SHA512
aafca528c9ca2f4e756df04e0b95862cd872b712fe5c3138752d9f65de90f340423d7bab976d9c6a1d890118c720026a9d8b9a229d4dee78dc02d6595f31cc41
-
SSDEEP
98304:pIgu5JSgwY2bb+YIqdhoBmoziggpNamZTHwwYFiFN:pVu/SSE6YboBmo23KmZTHwwN
-
Class file contains resources related to AdWind
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Modifies file permissions
-
Adds Run key to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-