General
-
Target
beastoptimain.exe
-
Size
17.9MB
-
Sample
241015-rwewbstemj
-
MD5
1ce75f24dbe65c738476bb2e53ea90d6
-
SHA1
79b16edfa74cd489bc31f7a48185ad76f67e6f54
-
SHA256
3fce152fb27699b3adb0a791d5774dc04eed321286c7c928c277d1281678136a
-
SHA512
e5b7274d64f3d94c9a46b46af8f98301081186be5178e5ed190622078cb8e7b71a7c84f8645e72262c767461abefa97008e63b62b0ec458cad4dcf05e2e64d35
-
SSDEEP
393216:0qPnLFXlr/QMDOETgsvfGwg1zB3lvErBNtMUztUq:VPLFXN/QREJS9KdPM4
Behavioral task
behavioral1
Sample
beastoptimain.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
beastoptimain.exe
-
Size
17.9MB
-
MD5
1ce75f24dbe65c738476bb2e53ea90d6
-
SHA1
79b16edfa74cd489bc31f7a48185ad76f67e6f54
-
SHA256
3fce152fb27699b3adb0a791d5774dc04eed321286c7c928c277d1281678136a
-
SHA512
e5b7274d64f3d94c9a46b46af8f98301081186be5178e5ed190622078cb8e7b71a7c84f8645e72262c767461abefa97008e63b62b0ec458cad4dcf05e2e64d35
-
SSDEEP
393216:0qPnLFXlr/QMDOETgsvfGwg1zB3lvErBNtMUztUq:VPLFXN/QREJS9KdPM4
Score7/10-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-