General
-
Target
6de33fc0084b434fb9ff8020c55cd080f6535e455e3b41a7ae7d843f410f8521
-
Size
322KB
-
Sample
230923-rwce7sab95
-
MD5
29a8c07e7b0aedf979ccef19cd5e81ce
-
SHA1
01037b4141dca730c768c652af89beb53152f321
-
SHA256
6de33fc0084b434fb9ff8020c55cd080f6535e455e3b41a7ae7d843f410f8521
-
SHA512
3099817d1be50a8ce8c2faf461a131e5de8c98aefcf8617444e98df70ffe0d513a2446913d7bf242e80e4abf4866b8a6e9813a10338b0accf98d05415a6c3ae4
-
SSDEEP
3072:8IGjsqhP5nkzTGW80/tIoM/oh47emDOzgfkLcrtJ4B:PGjJhhnkzgitId/emDOM2
Static task
static1
Malware Config
Extracted
stealc
http://bryanzachary.top
-
url_path
/e9c345fc99a4e67e.php
Targets
-
-
Target
6de33fc0084b434fb9ff8020c55cd080f6535e455e3b41a7ae7d843f410f8521
-
Size
322KB
-
MD5
29a8c07e7b0aedf979ccef19cd5e81ce
-
SHA1
01037b4141dca730c768c652af89beb53152f321
-
SHA256
6de33fc0084b434fb9ff8020c55cd080f6535e455e3b41a7ae7d843f410f8521
-
SHA512
3099817d1be50a8ce8c2faf461a131e5de8c98aefcf8617444e98df70ffe0d513a2446913d7bf242e80e4abf4866b8a6e9813a10338b0accf98d05415a6c3ae4
-
SSDEEP
3072:8IGjsqhP5nkzTGW80/tIoM/oh47emDOzgfkLcrtJ4B:PGjJhhnkzgitId/emDOM2
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-