General
-
Target
11271592606.zip
-
Size
211KB
-
Sample
230728-2j9kaaaa45
-
MD5
0650df7c8710e8903b90425d0751424c
-
SHA1
d7ce1fcbc41c4477fcd83e6ec4a9cb951aa19996
-
SHA256
bceb7feb4613ac228f25eb96d6b4d5f41bd1d94642b0e131a6fea147c4121c39
-
SHA512
53626049eb026aec3a62339042c9aba6a5ac7aec4080b295b0de05e29041cd2275609c00124dd2c95fe7ca059cdf87739f27b9a64de96fe065bb1ae21e2a61e6
-
SSDEEP
6144:uLdEPqIAIpADhgtPF0SKdvTnVW/ag+EJ5Ps:g/xIp+fvoCg+kK
Behavioral task
behavioral1
Sample
9f2a970442b3b9551f3fc534f19b989cb24c652ca5ac2e4eea515ac6b91bf0b7.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9f2a970442b3b9551f3fc534f19b989cb24c652ca5ac2e4eea515ac6b91bf0b7.exe
Resource
win10v2004-20230703-en
Malware Config
Extracted
predatorstealer
http://www.trackingafrica.net/cgi-admin/
Targets
-
-
Target
9f2a970442b3b9551f3fc534f19b989cb24c652ca5ac2e4eea515ac6b91bf0b7
-
Size
536KB
-
MD5
ce0d92e0c437b96373597ed18de7324e
-
SHA1
1695af76eda0e99b5159db064557f7c6dbd493c5
-
SHA256
9f2a970442b3b9551f3fc534f19b989cb24c652ca5ac2e4eea515ac6b91bf0b7
-
SHA512
75e6f2060c0ec516107c6987763bd90befe6cb65d97aa315d0ddd1f71c80454aed9fe5f96f1bb7e43e57470faf0583028f2562dbc3bbb9cb52f1136fc4b41226
-
SSDEEP
6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJUR:OPw2PjCLe3a6Q70zbYow60R
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-