General
-
Target
KabisoXiit vPrime 2,9 !!!.exe
-
Size
7.7MB
-
Sample
250122-nzxzjavmcz
-
MD5
63c9183d9661079e905122a3e2cf7f20
-
SHA1
d7dc54967b519dbc4e5d02653f7ffcf4a5d4ab06
-
SHA256
4f2fead90663b4cf8fb3ac17aa500a20b70feb3da5a13d9dd146cbb97f269eb3
-
SHA512
00fcbf21074b513ffb8fb4f0b8072fc3e5169ef64e17a660751a2971a4c738a3d1c871f87eec7763c238eb5cd75377c0c66678b9c449aa603a945bcd32f6849d
-
SSDEEP
196608:/M015QmGqqeNTfm/pf+xk4dWRatrbWOjgKU:NQmGqly/pWu4kRatrbvMKU
Malware Config
Targets
-
-
Target
KabisoXiit vPrime 2,9 !!!.exe
-
Size
7.7MB
-
MD5
63c9183d9661079e905122a3e2cf7f20
-
SHA1
d7dc54967b519dbc4e5d02653f7ffcf4a5d4ab06
-
SHA256
4f2fead90663b4cf8fb3ac17aa500a20b70feb3da5a13d9dd146cbb97f269eb3
-
SHA512
00fcbf21074b513ffb8fb4f0b8072fc3e5169ef64e17a660751a2971a4c738a3d1c871f87eec7763c238eb5cd75377c0c66678b9c449aa603a945bcd32f6849d
-
SSDEEP
196608:/M015QmGqqeNTfm/pf+xk4dWRatrbWOjgKU:NQmGqly/pWu4kRatrbvMKU
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-