General
-
Target
9735a5a6882e9fe7578d745f8a693b50.exe
-
Size
1.3MB
-
Sample
230329-txhpqaha66
-
MD5
9735a5a6882e9fe7578d745f8a693b50
-
SHA1
2cb86a0a4cafc825bf413f057ce067da7f802f74
-
SHA256
f49d931295e2da64727db9d3d867051232d54f0b2aad5c2cee896b40aa0e86fe
-
SHA512
7b6ded7b2dd74f399006223f523c294a546f11af9c00b5958ce6ed6734c916688ea8a59d6e961e40a65b633859b74e9f7635e100f72c0004830704d4e8a1b01b
-
SSDEEP
24576:29Cv53II5kebo7w0AshMGqOI0LslSIpO4u6+/3:2EII5Vo7w3shHoSk+v
Static task
static1
Behavioral task
behavioral1
Sample
9735a5a6882e9fe7578d745f8a693b50.exe
Resource
win7-20230220-en
Malware Config
Extracted
stealc
http://5.75.155.1/d522566a552de05d.php
Extracted
laplas
http://51.195.166.203
-
api_key
b6fe9b83a8d3b268f74c16f34b6930cd2d2a47117a90beb53ffd773d00945a9e
Targets
-
-
Target
9735a5a6882e9fe7578d745f8a693b50.exe
-
Size
1.3MB
-
MD5
9735a5a6882e9fe7578d745f8a693b50
-
SHA1
2cb86a0a4cafc825bf413f057ce067da7f802f74
-
SHA256
f49d931295e2da64727db9d3d867051232d54f0b2aad5c2cee896b40aa0e86fe
-
SHA512
7b6ded7b2dd74f399006223f523c294a546f11af9c00b5958ce6ed6734c916688ea8a59d6e961e40a65b633859b74e9f7635e100f72c0004830704d4e8a1b01b
-
SSDEEP
24576:29Cv53II5kebo7w0AshMGqOI0LslSIpO4u6+/3:2EII5Vo7w3shHoSk+v
-
Detects Stealc stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-