General
-
Target
SecuriteInfocomWin32RATXg.exe
-
Size
7.2MB
-
Sample
230701-jczgmaha7z
-
MD5
107e19edf19eeab1bcf4278e4c2e6046
-
SHA1
5a0d934e40701f68942cffaca49d4af14f45943a
-
SHA256
05999a0d0e1c377026f3b4226305de14445658c1d67a9aea5b893548352fb89e
-
SHA512
588635b932216cae163fa1c44ac72a4552014827aab6e4eaac63660946716f3bb6074fa1fa72ad78ed390a4a7943a3f4233ca7711f22d111347288ba306eca91
-
SSDEEP
196608:G0Ndo0wZsyG7tN166wmvNx/A3PLBfTDeLU4o4e:G/nG7tz69Wxo/LJTydo4e
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfocomWin32RATXg.exe
Resource
win7-20230621-en
Malware Config
Extracted
stealc
http://94.130.170.32/7ea86bf53b29dae5.php
Targets
-
-
Target
SecuriteInfocomWin32RATXg.exe
-
Size
7.2MB
-
MD5
107e19edf19eeab1bcf4278e4c2e6046
-
SHA1
5a0d934e40701f68942cffaca49d4af14f45943a
-
SHA256
05999a0d0e1c377026f3b4226305de14445658c1d67a9aea5b893548352fb89e
-
SHA512
588635b932216cae163fa1c44ac72a4552014827aab6e4eaac63660946716f3bb6074fa1fa72ad78ed390a4a7943a3f4233ca7711f22d111347288ba306eca91
-
SSDEEP
196608:G0Ndo0wZsyG7tN166wmvNx/A3PLBfTDeLU4o4e:G/nG7tz69Wxo/LJTydo4e
-
Detects Stealc stealer
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-