General
-
Target
dpYZvD
-
Size
496B
-
Sample
241017-t75x1avdqc
-
MD5
15ad4035e30bdeb0f5eb426c542e8058
-
SHA1
4a87e3e681dc71252e621281d8152e8776ce8241
-
SHA256
1141d5cd4398321071d654de1b46a10b772ab722791461026872539eedfb09be
-
SHA512
cb06177f64e8f168af75cd9db9fe172d7638d64a44fd24022d16f8e70f27e7827fd0ab4569af5b42fb66b6cfd269d2c9379811a24cdaaaebb94d278d4251f799
Static task
static1
Behavioral task
behavioral1
Sample
dpYZvD.html
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
dpYZvD
-
Size
496B
-
MD5
15ad4035e30bdeb0f5eb426c542e8058
-
SHA1
4a87e3e681dc71252e621281d8152e8776ce8241
-
SHA256
1141d5cd4398321071d654de1b46a10b772ab722791461026872539eedfb09be
-
SHA512
cb06177f64e8f168af75cd9db9fe172d7638d64a44fd24022d16f8e70f27e7827fd0ab4569af5b42fb66b6cfd269d2c9379811a24cdaaaebb94d278d4251f799
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-