General
-
Target
Triggerbot.exe
-
Size
10.2MB
-
Sample
240630-wtcems1hqf
-
MD5
e9c2ac78313b4d58822113ece3259b0b
-
SHA1
ae6196446df9c8f52b6da44f6f02c1fa233d13f6
-
SHA256
94d65efdd3579cd8ec3430c6608ba4ea876c3c63b5314b4095628218eaac2426
-
SHA512
a5aef56bb8b2997c0275cdfa8dddb81d10f43fee2d9ab830ed2503c00b3b4136c8c9e8a5db7a116c19a844b4b13471bb2de74578c8937713eec6cd6e6353ef39
-
SSDEEP
196608:mkLEkYcowuLIoBA1HeT39Iigwh1ncKOVVtc97XEtQ1NjOp4U:dEkYcXIq1+TtIiFv0VQx060l
Behavioral task
behavioral1
Sample
Triggerbot.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Triggerbot.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
cstealer.pyc
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
cstealer.pyc
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
Triggerbot.exe
-
Size
10.2MB
-
MD5
e9c2ac78313b4d58822113ece3259b0b
-
SHA1
ae6196446df9c8f52b6da44f6f02c1fa233d13f6
-
SHA256
94d65efdd3579cd8ec3430c6608ba4ea876c3c63b5314b4095628218eaac2426
-
SHA512
a5aef56bb8b2997c0275cdfa8dddb81d10f43fee2d9ab830ed2503c00b3b4136c8c9e8a5db7a116c19a844b4b13471bb2de74578c8937713eec6cd6e6353ef39
-
SSDEEP
196608:mkLEkYcowuLIoBA1HeT39Iigwh1ncKOVVtc97XEtQ1NjOp4U:dEkYcXIq1+TtIiFv0VQx060l
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
-
-
Target
cstealer.pyc
-
Size
67KB
-
MD5
131ea26795ec4d7cf7e8ffd0be65deee
-
SHA1
549f66cbffc8a1e8710acedf4f215376f8dde10d
-
SHA256
c7226d58800fd4f03d4de9ca2bca13c095c14b1ca9c0d77e9824d24d7f51860e
-
SHA512
c763574297ccd01eba7d26c409244650952f88b55e0cc5b9422be2ac412ea16d0828d7fa731fcf690d52624298f1362b575a44af1aeeaff55cb6a676ee46fd51
-
SSDEEP
1536:l0xqOgDxpqBJlMstbo88jLQQFX3qS0Vr+LRheG:lqs/+bo88PDXh0r+LRP
Score3/10 -