General
-
Target
VegaStealer_v1.bin.zip
-
Size
6.7MB
-
Sample
231011-zpfs2sch61
-
MD5
0bff307fd3b86ebcb8a6dffa555d7062
-
SHA1
ad56438898ff8be6e2dfe53d9ba1cb0e433691b3
-
SHA256
818990fafe6019b9d39d7d3cc5514c1451de5474e73b570d4405f63554055e1c
-
SHA512
30c5be70641bc3b8c7d4c4dc54eb147b9e9b855dde1677bfbe2f1f7d3d8f8ea1f0f3b3a80e4a2fe80083db4ebbb9a2e542cc5178f13fb17bfc1e746600ff22b3
-
SSDEEP
196608:uSSKjk1mW9DRUJtYYbVJh6/Q1NYyZCn+Y/H/W+Ey:5JjnWgtYYF6/Q1M+8/W+b
Static task
static1
Behavioral task
behavioral1
Sample
VegaStealer_v1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
VegaStealer_v1.exe
Resource
win10v2004-20230915-en
Malware Config
Targets
-
-
Target
VegaStealer_v1.bin
-
Size
6.7MB
-
MD5
41b8caca7e2c1ec36c2528fcd6a3f334
-
SHA1
45ef2451a4916cf5c88e90eb1e4360f04ba3549e
-
SHA256
c59fdd5b90add682937cc8dfccfb84d460ea9f14c3dc9df895a0b8596877fb16
-
SHA512
f160616571478eb55fb6a61c94961c7c47b0db56f03638918641fdfbc505e929921b88a9059d44554edee6e6a1c4e73127c0db0fe9df0df8d69ac73f9fa4599f
-
SSDEEP
196608:Rrp3ECTkyi+4l72FW1aq3BzV+gSYyPO6GEkhQAp6UFj4:VHw/lqFWYq3lV+gSYyP3GEkmJ
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-