General
-
Target
b003fca8539284507976b319201efd5e.exe
-
Size
221KB
-
Sample
230705-qlmmrace83
-
MD5
b003fca8539284507976b319201efd5e
-
SHA1
a5b23388a47a3530e81b4b32e173526c20b55e88
-
SHA256
22d3277898429127b4566110be173684bdcb40773cac030bc4818dfd4677a3b0
-
SHA512
21e12da259f8b05d112b8d705c67959b9642c94cd3ef59429689eb74ad54202a52dfdb29ab4d16df8173fb140b904e58ebf19d33073d6ba01ad9c4955b75e2ac
-
SSDEEP
3072:6oYWKJDW7QH3apiqevYo8n7BhUygUkK8gCE+Cs9P1oB6n:Z1pY3agqebuthUyRky+rsB
Static task
static1
Behavioral task
behavioral1
Sample
b003fca8539284507976b319201efd5e.exe
Resource
win7-20230621-en
Malware Config
Extracted
stealc
http://45.15.159.188/f2cb651e3e755a0f.php
Targets
-
-
Target
b003fca8539284507976b319201efd5e.exe
-
Size
221KB
-
MD5
b003fca8539284507976b319201efd5e
-
SHA1
a5b23388a47a3530e81b4b32e173526c20b55e88
-
SHA256
22d3277898429127b4566110be173684bdcb40773cac030bc4818dfd4677a3b0
-
SHA512
21e12da259f8b05d112b8d705c67959b9642c94cd3ef59429689eb74ad54202a52dfdb29ab4d16df8173fb140b904e58ebf19d33073d6ba01ad9c4955b75e2ac
-
SSDEEP
3072:6oYWKJDW7QH3apiqevYo8n7BhUygUkK8gCE+Cs9P1oB6n:Z1pY3agqebuthUyRky+rsB
-
Detects Stealc stealer
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-