General
-
Target
cc8638cd86f89b6713993edca48e37e9.bin
-
Size
587KB
-
Sample
230605-tsga4aab5s
-
MD5
30b4235f130173ad81507618f103cb6a
-
SHA1
22e985f20f6de14a01928958506237b4183bc159
-
SHA256
60f9710d90abd5afa424c219ec72d9f957060373975e91b543e85594876f4a48
-
SHA512
880a72c4f088072457f5259a7c04d834e931f9d376a9b2d4a5fc36721a728de3d43ce772486929ce173fcd608a9ec9dde6dabff4a35ecc17653ef367c0e01635
-
SSDEEP
12288:qL5tJPC/5mOysyW8Iel0WoNeFTQ1xQq/UNrBZwHbRwsPc3qkPr:q0/5hyPVDoNQQPWrBSHtwT7
Static task
static1
Behavioral task
behavioral1
Sample
5593569a8cccb31bf93eaeee499c0af142d9c8ccf3b9169e6ddd24f7e81c95e0.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5593569a8cccb31bf93eaeee499c0af142d9c8ccf3b9169e6ddd24f7e81c95e0.exe
Resource
win10v2004-20230221-en
Malware Config
Targets
-
-
Target
5593569a8cccb31bf93eaeee499c0af142d9c8ccf3b9169e6ddd24f7e81c95e0.exe
-
Size
672KB
-
MD5
cc8638cd86f89b6713993edca48e37e9
-
SHA1
90b4da2d23d5df5d29f3a86e9f8383a435126213
-
SHA256
5593569a8cccb31bf93eaeee499c0af142d9c8ccf3b9169e6ddd24f7e81c95e0
-
SHA512
d9bceb56353ad4b4542fd1ce0237f3bd1b1542d3f7083b243dc1e435cad45f42aabd1a23e2db8c12db299b62ecce4db82a753e9458c6370354469e0b546281aa
-
SSDEEP
12288:lLYA9TJRcNEFAl/uqzFEqiPTriluFeutSfzoK6e5Zn7qBbQGyVoKMdW:lfJSy2u0EqiHilAeutSfzoK6gZgsCa
-
Find unpacked information stealer based on possible SQL query to retrieve broswer data
Detects infostealer.
-
Downloads MZ/PE file
-
Sets service image path in registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-