General
-
Target
55df033fe62f9b849870c10e28db0432cb4287e278cfc80acc3d113a6887513d
-
Size
263KB
-
Sample
231005-avxw3sfg6x
-
MD5
108f64fe904c91b51067316c572931cb
-
SHA1
bc545c008063d7deaf0715368d96d904db78c668
-
SHA256
55df033fe62f9b849870c10e28db0432cb4287e278cfc80acc3d113a6887513d
-
SHA512
3f4c5c7684275ace512fb217bb4e38dfdc716919b7bd106d6a30e45a68966cc2fd4f84cd2054ee4695e9daad6eb15a67c5d2c435fcef00b959b4f042ae9864b5
-
SSDEEP
3072:VRmACtZyJtXMBmTEKneNIN2KPOKmgImzG2LAifDX6SKJB0ivcfEg//c851M/Vr:DCmJRM4ruI/hIDPiLKJBv5g/0HV
Static task
static1
Malware Config
Extracted
stealc
http://aidandylan.top
-
url_path
/3886d2276f6914c4.php
Targets
-
-
Target
55df033fe62f9b849870c10e28db0432cb4287e278cfc80acc3d113a6887513d
-
Size
263KB
-
MD5
108f64fe904c91b51067316c572931cb
-
SHA1
bc545c008063d7deaf0715368d96d904db78c668
-
SHA256
55df033fe62f9b849870c10e28db0432cb4287e278cfc80acc3d113a6887513d
-
SHA512
3f4c5c7684275ace512fb217bb4e38dfdc716919b7bd106d6a30e45a68966cc2fd4f84cd2054ee4695e9daad6eb15a67c5d2c435fcef00b959b4f042ae9864b5
-
SSDEEP
3072:VRmACtZyJtXMBmTEKneNIN2KPOKmgImzG2LAifDX6SKJB0ivcfEg//c851M/Vr:DCmJRM4ruI/hIDPiLKJBv5g/0HV
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-