General
-
Target
Color bot written in py.exe
-
Size
14.6MB
-
Sample
250305-tshtxssqv9
-
MD5
897276fc553709ef67a4c17cef5f0b80
-
SHA1
446f651bf0f1f20d71c145c6661cd2a308d7b8f6
-
SHA256
4c012852b1f874922730c7b45fed0e2b8bd9566d8ae13c1c4222a7addc3b92da
-
SHA512
3bf62309025aed6803c606193bdffa7abf4d6376c9b2d41209d11a08fc4202f82e644a006f22da06d054d2669bcefbfbf7108860ccec38972dafb6e05406f4da
-
SSDEEP
393216:19Yi2Vlj87d9gdQuslSq9VoWOv+9fSZk1vwUrjLP2:19Yi2Vl8Z+dQuSTorvSKSFwUnLP2
Behavioral task
behavioral1
Sample
Color bot written in py.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Color bot written in py.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
Color bot written in py.exe
-
Size
14.6MB
-
MD5
897276fc553709ef67a4c17cef5f0b80
-
SHA1
446f651bf0f1f20d71c145c6661cd2a308d7b8f6
-
SHA256
4c012852b1f874922730c7b45fed0e2b8bd9566d8ae13c1c4222a7addc3b92da
-
SHA512
3bf62309025aed6803c606193bdffa7abf4d6376c9b2d41209d11a08fc4202f82e644a006f22da06d054d2669bcefbfbf7108860ccec38972dafb6e05406f4da
-
SSDEEP
393216:19Yi2Vlj87d9gdQuslSq9VoWOv+9fSZk1vwUrjLP2:19Yi2Vl8Z+dQuSTorvSKSFwUnLP2
Score7/10-
Drops startup file
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Enumerates processes with tasklist
-