General
-
Target
file.exe
-
Size
1.3MB
-
Sample
230330-hbtdjsbc35
-
MD5
ceb62b6ac343ec808a818267e0ef4f6b
-
SHA1
d936107b1ebd5afe7c61db40c651c583b8b58487
-
SHA256
e08ffdbd935971d2ad62d3ecdb736d34302a230485de662a7f6fab81f39df48b
-
SHA512
88b4ed35a22a2dd19d3ee81f8dddfca9e2a871475ce965a5d0038612266d68fe2e50d9d53a89eba9d37f309c614eb218dfb25e75a20ac56ac54e753eca1c6a47
-
SSDEEP
24576:pYEtXdWl96ju5KGkcIGFI+kMixFDEHq55LOw:/Lg4sKG/IGFQXxZf55Lj
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230220-en
Malware Config
Extracted
stealc
http://5.75.155.1/d522566a552de05d.php
Extracted
laplas
http://51.195.166.203
-
api_key
b6fe9b83a8d3b268f74c16f34b6930cd2d2a47117a90beb53ffd773d00945a9e
Targets
-
-
Target
file.exe
-
Size
1.3MB
-
MD5
ceb62b6ac343ec808a818267e0ef4f6b
-
SHA1
d936107b1ebd5afe7c61db40c651c583b8b58487
-
SHA256
e08ffdbd935971d2ad62d3ecdb736d34302a230485de662a7f6fab81f39df48b
-
SHA512
88b4ed35a22a2dd19d3ee81f8dddfca9e2a871475ce965a5d0038612266d68fe2e50d9d53a89eba9d37f309c614eb218dfb25e75a20ac56ac54e753eca1c6a47
-
SSDEEP
24576:pYEtXdWl96ju5KGkcIGFI+kMixFDEHq55LOw:/Lg4sKG/IGFQXxZf55Lj
-
Detects Stealc stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-