General
-
Target
File.exe
-
Size
12.8MB
-
Sample
231003-j5dqmahd2s
-
MD5
385608ed8e4908df8477083a8204ccfc
-
SHA1
4736871e50cc22a6119a380f57489a2f759efb89
-
SHA256
10e5e4e6973636f25bc8049e42511fef3d549c7f845fc7250a59c1d3c94513f8
-
SHA512
d31424884035615feef5f5a9413461d856df73dfa46834004aa75fc1fc5d03dc938d993fd72f4efded5e8d13d484b69c4484b743a140ef68038525c180ebae0f
-
SSDEEP
393216:X6lelTDstgl25Utvlzl4srAggD6ew9mCmkI04RJEM:Xac8glhlx4sdHnmkI0HM
Static task
static1
Behavioral task
behavioral1
Sample
File.exe
Resource
win7-20230831-en
Malware Config
Extracted
stealc
http://91.212.166.95
-
url_path
/08f7c1a754119dda.php
Targets
-
-
Target
File.exe
-
Size
12.8MB
-
MD5
385608ed8e4908df8477083a8204ccfc
-
SHA1
4736871e50cc22a6119a380f57489a2f759efb89
-
SHA256
10e5e4e6973636f25bc8049e42511fef3d549c7f845fc7250a59c1d3c94513f8
-
SHA512
d31424884035615feef5f5a9413461d856df73dfa46834004aa75fc1fc5d03dc938d993fd72f4efded5e8d13d484b69c4484b743a140ef68038525c180ebae0f
-
SSDEEP
393216:X6lelTDstgl25Utvlzl4srAggD6ew9mCmkI04RJEM:Xac8glhlx4sdHnmkI0HM
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-