General
-
Target
cheatloader.exe
-
Size
7.7MB
-
Sample
241101-ysk2hawmer
-
MD5
cd7ced7032f8a2e05a460f0579c3daba
-
SHA1
6c84735e5ee871284487fcf4644047fd3cc9f7a7
-
SHA256
5c6b8f80ecef33db96e30a29a71b48e3ff7dcf4e6bb3c1ac84e183e9359f6a80
-
SHA512
927bc7f65717eae87981df12274a0cb8d8bb809ea0f5bf1bef222f6aa29efdfcc557adfc6ca18c6d8f80c6b35c5c5ba908b53e0243a24139bde6fb3d1a0d5634
-
SSDEEP
196608:UG0fFneNTfm/pf+xk4dNSESRpmrbW3jmrU:ry/pWu4m5RpmrbmyrU
Behavioral task
behavioral1
Sample
cheatloader.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
cheatloader.exe
-
Size
7.7MB
-
MD5
cd7ced7032f8a2e05a460f0579c3daba
-
SHA1
6c84735e5ee871284487fcf4644047fd3cc9f7a7
-
SHA256
5c6b8f80ecef33db96e30a29a71b48e3ff7dcf4e6bb3c1ac84e183e9359f6a80
-
SHA512
927bc7f65717eae87981df12274a0cb8d8bb809ea0f5bf1bef222f6aa29efdfcc557adfc6ca18c6d8f80c6b35c5c5ba908b53e0243a24139bde6fb3d1a0d5634
-
SSDEEP
196608:UG0fFneNTfm/pf+xk4dNSESRpmrbW3jmrU:ry/pWu4m5RpmrbmyrU
-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-