Resubmissions
18-07-2024 14:50
240718-r7nbvawflc 10General
-
Target
XSpammer.exe
-
Size
17.0MB
-
Sample
240718-r7nbvawflc
-
MD5
f1efe5722cd8397bfec9e5f5d4db3a9f
-
SHA1
98b6cbaaa04fba418cdeb53a0b3de6f375a3d210
-
SHA256
0bc926b1734257ed2282252670bfcac9484b104fab9bcd7d8e7dc6c535121ffd
-
SHA512
5ecf04b4f79a44603304960dc78096296035b6985f0e4e28c4da2610576becd603503fc436ab20e2f2c8f8e183281d6ae6fbb1238008df7f453b124521d1320c
-
SSDEEP
393216:qiIE7YoPQwB9dM/IS+DfDgrc6Zc9f23Pj:T7rPQwBT6IS+b0IB9fgP
Behavioral task
behavioral1
Sample
XSpammer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral2
Sample
Boobies.pyc
Resource
win10v2004-20240709-en
Malware Config
Targets
-
-
Target
XSpammer.exe
-
Size
17.0MB
-
MD5
f1efe5722cd8397bfec9e5f5d4db3a9f
-
SHA1
98b6cbaaa04fba418cdeb53a0b3de6f375a3d210
-
SHA256
0bc926b1734257ed2282252670bfcac9484b104fab9bcd7d8e7dc6c535121ffd
-
SHA512
5ecf04b4f79a44603304960dc78096296035b6985f0e4e28c4da2610576becd603503fc436ab20e2f2c8f8e183281d6ae6fbb1238008df7f453b124521d1320c
-
SSDEEP
393216:qiIE7YoPQwB9dM/IS+DfDgrc6Zc9f23Pj:T7rPQwBT6IS+b0IB9fgP
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
-
-
Target
Boobies.pyc
-
Size
29KB
-
MD5
87a1ce96d5613ca6d45b1d77c02e8a48
-
SHA1
1dd52434ed50e9a915fd7ee429ddcdd576618f3a
-
SHA256
7bd5059176104056fc3dd3ecdabd09af5a0d4f93debdb36bb1987fb01e88b75d
-
SHA512
b55fde4851d43168be76fd6a2fafc742c637cce8d929e43a72a33b389c9aa91c03b78e4b3a305ad778c7da71b8377063ede2c98aedfec1a5f0f34d155d448848
-
SSDEEP
768:3+lVovnrSxRYjtSD9ASIBg49Uy6navHSpnLrVhHv4q0BSqCJr:30ovr1AvM+navypKBSqQr
Score3/10 -