General
-
Target
d383b7317144968474ca5318340e6d0e5c47bb2ed95a0ffeb8228d28b3538ca8
-
Size
198KB
-
Sample
231001-py8kbacd32
-
MD5
1f808e080d62acfda4d570fc5bd087e7
-
SHA1
29c85c2bfadc56c67213f0c88755812479120e97
-
SHA256
d383b7317144968474ca5318340e6d0e5c47bb2ed95a0ffeb8228d28b3538ca8
-
SHA512
b0827c3bd2851f73004bd976bda13956d6ddae4206e52170a32a229b0df0823b5092517d3bcec839246828cbc907cd5302f7f3e3fef62c05cc0d37cc911bffcd
-
SSDEEP
3072:M+Y8WZnbgbWtoslfiNGq8WA/cLIOqjQGjJZ7mb5/3Hl:HGEK+slfzqc/TNjVvEV
Static task
static1
Malware Config
Extracted
stealc
-
url_path
/e9c345fc99a4e67e.php
Targets
-
-
Target
d383b7317144968474ca5318340e6d0e5c47bb2ed95a0ffeb8228d28b3538ca8
-
Size
198KB
-
MD5
1f808e080d62acfda4d570fc5bd087e7
-
SHA1
29c85c2bfadc56c67213f0c88755812479120e97
-
SHA256
d383b7317144968474ca5318340e6d0e5c47bb2ed95a0ffeb8228d28b3538ca8
-
SHA512
b0827c3bd2851f73004bd976bda13956d6ddae4206e52170a32a229b0df0823b5092517d3bcec839246828cbc907cd5302f7f3e3fef62c05cc0d37cc911bffcd
-
SSDEEP
3072:M+Y8WZnbgbWtoslfiNGq8WA/cLIOqjQGjJZ7mb5/3Hl:HGEK+slfzqc/TNjVvEV
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-