General
-
Target
Relikeas4v4 Privado.exe
-
Size
7.5MB
-
Sample
241017-zcy4vsxhlp
-
MD5
c67e114c519bdc525afcf7e118814a70
-
SHA1
a7c5904f8472a7b3fb5f278488d122bda4e8b8a4
-
SHA256
bc9a011fdb36439c6e6a89b748735008ae329e8fdfebbceae1fd8b258a0d11c8
-
SHA512
177b8d94161a14435dfd20698f51cc403a1fa3f381b1ee0d6285adb3331ee5c49ac17edf2cb5afb5839ffb1f72f0c37c6a02e4914701dfa97407eeaa9a25240f
-
SSDEEP
196608:ncunqZ0wfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSg:PmIH2XgHq+jq93YoV
Behavioral task
behavioral1
Sample
Relikeas4v4 Privado.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Relikeas4v4 Privado.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
�k�6��.pyc
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
�k�6��.pyc
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Relikeas4v4 Privado.exe
-
Size
7.5MB
-
MD5
c67e114c519bdc525afcf7e118814a70
-
SHA1
a7c5904f8472a7b3fb5f278488d122bda4e8b8a4
-
SHA256
bc9a011fdb36439c6e6a89b748735008ae329e8fdfebbceae1fd8b258a0d11c8
-
SHA512
177b8d94161a14435dfd20698f51cc403a1fa3f381b1ee0d6285adb3331ee5c49ac17edf2cb5afb5839ffb1f72f0c37c6a02e4914701dfa97407eeaa9a25240f
-
SSDEEP
196608:ncunqZ0wfI9jUC2XMvH8zPjweaBpZ0cX2ooccXK7oSg:PmIH2XgHq+jq93YoV
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-
-
-
Target
�k�6��.pyc
-
Size
1KB
-
MD5
432afd3a7c9b8de91bcea8bde2eb8934
-
SHA1
f1b0e1d15c69c8a261b9deb4c7f7ed62b10bc19c
-
SHA256
2450dcd44924986a1ba6eeeb90d6a172f00560874b2f3b2ad4cb12f6534c5964
-
SHA512
a5e9e878f45450f791885a287a611c7c801262e2f8b8c85287e01a8eefef9e4d9dfb83e9b7f9cd13bf85d5b2a1ce7b1ef1616af3115214055e380c066a8e202f
Score1/10 -