General
-
Target
VALOGRAYHACKCRACKEDbyNEXTRA.exe
-
Size
17.4MB
-
Sample
240818-xpc12syfme
-
MD5
984dc1d56353478378a9f42895158a21
-
SHA1
19601c29664a559485be7cd244f49e72a6e506af
-
SHA256
d8ed4b8856ae7ae313379161a477d60f1d561cf53dd560a073b8fe844f8c8344
-
SHA512
34dc5b08d5d713cac66edd4349b546dee566073e217d4e7143712ceb5301ea134e7d7e495c5bb29c4143bd497133938a1b4e797b9a992e76514bf5cff27b611d
-
SSDEEP
393216:6PsbGcTDbyWQj2/780nkk6cL+9qz88Ck+7q3p91JdNqfqWg:6PennXI0n8I+9q4G331ofqWg
Behavioral task
behavioral1
Sample
VALOGRAYHACKCRACKEDbyNEXTRA.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
VALOGRAYHACKCRACKEDbyNEXTRA.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
VALOGRAYHACKCRACKEDbyNEXTRA.exe
-
Size
17.4MB
-
MD5
984dc1d56353478378a9f42895158a21
-
SHA1
19601c29664a559485be7cd244f49e72a6e506af
-
SHA256
d8ed4b8856ae7ae313379161a477d60f1d561cf53dd560a073b8fe844f8c8344
-
SHA512
34dc5b08d5d713cac66edd4349b546dee566073e217d4e7143712ceb5301ea134e7d7e495c5bb29c4143bd497133938a1b4e797b9a992e76514bf5cff27b611d
-
SSDEEP
393216:6PsbGcTDbyWQj2/780nkk6cL+9qz88Ck+7q3p91JdNqfqWg:6PennXI0n8I+9q4G331ofqWg
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-