General
-
Target
Razer.exe
-
Size
8.8MB
-
Sample
241030-rbnbzawnal
-
MD5
7c80d3052ab9012dbe9b387aa2da7650
-
SHA1
ff4ff0c0f3cbfa04984f64a07d00b9285d9d9c79
-
SHA256
39a8c7a0856f289c1e271ca36d56030fac2feba7b627c02dc3b832f2b9115fa9
-
SHA512
2c48f8ee9e6d5d6d14796f3ffb2e36d1f22d0e17a1f2c41b9f9cdca6675f6601bc7b539f651fde9e01fb4435104edb65db988e1b95c50775ec204d6288697e86
-
SSDEEP
196608:LduCoYnnLGwfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jq:QYnpIHziK1piXLGVE4UqC0VJG
Behavioral task
behavioral1
Sample
Razer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Razer.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
Razer.exe
-
Size
8.8MB
-
MD5
7c80d3052ab9012dbe9b387aa2da7650
-
SHA1
ff4ff0c0f3cbfa04984f64a07d00b9285d9d9c79
-
SHA256
39a8c7a0856f289c1e271ca36d56030fac2feba7b627c02dc3b832f2b9115fa9
-
SHA512
2c48f8ee9e6d5d6d14796f3ffb2e36d1f22d0e17a1f2c41b9f9cdca6675f6601bc7b539f651fde9e01fb4435104edb65db988e1b95c50775ec204d6288697e86
-
SSDEEP
196608:LduCoYnnLGwfI9jUCzi4H1qSiXLGVi7DMgpZkrl7Q0VMwICEc/jq:QYnpIHziK1piXLGVE4UqC0VJG
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-