General
-
Target
file.exe
-
Size
208KB
-
Sample
230920-s22gysbb84
-
MD5
bc3cbd915ff8541d550a7a389cd7716a
-
SHA1
db5215e8890f726c7d0688504cc7771c936c18e1
-
SHA256
c81fa46b63a77fcabb07e917378f7df25757a771ff3d4d3c2f789d17107836b1
-
SHA512
9e7a4dcfcc11d84059c02972f1cba2ac892f2f49d546d6fe2a13b55f0d232090702d88acb21004b11568892024ee4a12db3f4623a00b47d1814fc1abbfadea8f
-
SSDEEP
3072:JXtSanqKBzFBjlMqZNARKo1cDEDg0kseF3l5JgU3Tog:twgnBzF4q/41UcgseFhgU3TF
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Malware Config
Extracted
stealc
http://bryanzachary.top
-
url_path
/e9c345fc99a4e67e.php
Targets
-
-
Target
file.exe
-
Size
208KB
-
MD5
bc3cbd915ff8541d550a7a389cd7716a
-
SHA1
db5215e8890f726c7d0688504cc7771c936c18e1
-
SHA256
c81fa46b63a77fcabb07e917378f7df25757a771ff3d4d3c2f789d17107836b1
-
SHA512
9e7a4dcfcc11d84059c02972f1cba2ac892f2f49d546d6fe2a13b55f0d232090702d88acb21004b11568892024ee4a12db3f4623a00b47d1814fc1abbfadea8f
-
SSDEEP
3072:JXtSanqKBzFBjlMqZNARKo1cDEDg0kseF3l5JgU3Tog:twgnBzF4q/41UcgseFhgU3TF
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-