General
-
Target
sample
-
Size
522KB
-
Sample
241023-swjd7azajp
-
MD5
99f111b1f63035345dc19465df38476a
-
SHA1
93aa558e3373a009fc0ec03d365d142eb8fca2d3
-
SHA256
859f1686da77121c84375c946294915ff7e89452ed728737a66c744e3cab68dc
-
SHA512
8daea2c8156c704a5d14c5d9b8f7a0d0454028969500560cee6d299cafb152b0e9fb2ff8af0652a0aebea0103b39ddaf0df3b120abee51d48adda340b8f54f39
-
SSDEEP
6144:Da7n0fn0fJ0fm0f/0fM0f00fq0fH0fX0f+lPsz:DUn0P0h0O0X0E0c0y0f0v0GlPe
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win11-20241007-en
Malware Config
Targets
-
-
Target
sample
-
Size
522KB
-
MD5
99f111b1f63035345dc19465df38476a
-
SHA1
93aa558e3373a009fc0ec03d365d142eb8fca2d3
-
SHA256
859f1686da77121c84375c946294915ff7e89452ed728737a66c744e3cab68dc
-
SHA512
8daea2c8156c704a5d14c5d9b8f7a0d0454028969500560cee6d299cafb152b0e9fb2ff8af0652a0aebea0103b39ddaf0df3b120abee51d48adda340b8f54f39
-
SSDEEP
6144:Da7n0fn0fJ0fm0f/0fM0f00fq0fH0fX0f+lPsz:DUn0P0h0O0X0E0c0y0f0v0GlPe
-
Downloads MZ/PE file
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-