General
-
Target
BotLobby.rar
-
Size
14.2MB
-
Sample
240809-bcbfsstdpj
-
MD5
62a6b88b39424b033db7bb13fadf97ac
-
SHA1
e96806d6910b8884990ee816cba80131be706a82
-
SHA256
a05bfbe6d72fdb7bbf2d3fc4cae634f319c1e90f746bb49338833b6f5ed5c221
-
SHA512
ca4aed1ce56fc2ec94bbd0c6dce9531982635856107816b7f980ec5b3cee910832d96dcdb69d36b8df3128f387d755c9413dbd604c9ba9bc054a9495b7152b09
-
SSDEEP
393216:vbliOiDWoCI2Msi0x9F9UJr7WFhVF4Nob7Zdro3T:ToOiDWoH25i0ExUwYZN+
Behavioral task
behavioral1
Sample
Botlobby.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Botlobby.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
Botlobby.exe
-
Size
14.4MB
-
MD5
a7d3b205c86fe21a3032d9a63429be23
-
SHA1
018202c85fbcb56dd35b2383cad728d48de2fff6
-
SHA256
b7853963eea3ed2d67761d6b6319b9e83318ffcf554fd91d9ac62ce0fa37cc86
-
SHA512
6d7d6cd9475d501a873d2b38dc6311c2bb66f91c365eb6d874e4bf444e1210c668bfcc8e1826501b27671aeb8301d0ee8135f12ec7fb73b8d18f509d9a9786ed
-
SSDEEP
393216:kiIE7YoPQJidQuslSq99oWOv+9fg9aIQjAG:97rPQwdQuSDorvSY9a5A
Score9/10-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Drops startup file
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Enumerates processes with tasklist
-