General
-
Target
file.exe
-
Size
234KB
-
Sample
230930-2h8llahc52
-
MD5
957d853736cd6c27ab3fa4ed491d1a96
-
SHA1
db355f36fcda0a3fec9308bd532fc706b80deebe
-
SHA256
421f7e7128482d501fc4c7d44748061d9572f8a1b053bd07cb5fe16e9dcc4428
-
SHA512
7ef0d32fa8416197c692c8c73d160f6348bd543e947a172be786faf5beb587c139849cc951a16d44b44589ce2a19bca3da4ad5bc61553ad88068494911fa81eb
-
SSDEEP
3072:53kEZR5xvQU2uQ/bY8YYlf63NX4OqS5/k16ATO3:5xverUf3KO5dAT
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
Malware Config
Extracted
stealc
-
url_path
/e9c345fc99a4e67e.php
Targets
-
-
Target
file.exe
-
Size
234KB
-
MD5
957d853736cd6c27ab3fa4ed491d1a96
-
SHA1
db355f36fcda0a3fec9308bd532fc706b80deebe
-
SHA256
421f7e7128482d501fc4c7d44748061d9572f8a1b053bd07cb5fe16e9dcc4428
-
SHA512
7ef0d32fa8416197c692c8c73d160f6348bd543e947a172be786faf5beb587c139849cc951a16d44b44589ce2a19bca3da4ad5bc61553ad88068494911fa81eb
-
SSDEEP
3072:53kEZR5xvQU2uQ/bY8YYlf63NX4OqS5/k16ATO3:5xverUf3KO5dAT
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-