General
-
Target
toniecheat.exe
-
Size
24.4MB
-
Sample
241125-2csceswpbp
-
MD5
d107cbeaef45f5cd7ddbb0d88e683aef
-
SHA1
db2a52cefd9414a14ef3b31b9bddb4b290de71f0
-
SHA256
b63155f617da18b3d56a178921a60cffb4cfb227142ed2f9989ce52655969d72
-
SHA512
cce1a2066ccb44ead1990506115760a501b516e4df6facd33eaf4fd9728fef9e8705f59da607fb0ffe10e987fda06c73d053649bb54a619c6fc7d1833938da8d
-
SSDEEP
786432:/TEGs1OEi/UMnspKXk8BEWL11JDjszSljW21:m1Ob8YXvJv1Yza
Behavioral task
behavioral1
Sample
toniecheat.exe
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
toniecheat.exe
-
Size
24.4MB
-
MD5
d107cbeaef45f5cd7ddbb0d88e683aef
-
SHA1
db2a52cefd9414a14ef3b31b9bddb4b290de71f0
-
SHA256
b63155f617da18b3d56a178921a60cffb4cfb227142ed2f9989ce52655969d72
-
SHA512
cce1a2066ccb44ead1990506115760a501b516e4df6facd33eaf4fd9728fef9e8705f59da607fb0ffe10e987fda06c73d053649bb54a619c6fc7d1833938da8d
-
SSDEEP
786432:/TEGs1OEi/UMnspKXk8BEWL11JDjszSljW21:m1Ob8YXvJv1Yza
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Clipboard Data
Adversaries may collect data stored in the clipboard from users copying information within or between applications.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
Enumerates processes with tasklist
-