General
-
Target
bc290eadffd4393ed0eb53833d81b4dc2b35205c16a9b4f2f5858889e17f5307.exe
-
Size
231KB
-
Sample
231016-gx7mmaca81
-
MD5
31d89c2bbe767ba9327a444a53e1877b
-
SHA1
7870f2a331a793f7c522238dbf29f572ef639370
-
SHA256
bc290eadffd4393ed0eb53833d81b4dc2b35205c16a9b4f2f5858889e17f5307
-
SHA512
18c67ca8eff392fe1a18c3625ef668aa4239453f8a49de2cfc090a9a03115177c783fac50bf1c6f389845aad96f7a6e5465e190448ba167b8016f7a4b190637f
-
SSDEEP
3072:8GRAyZ+3WlzjdpnveRnH5uNZYhaRKfjlHGpHIZ8d9xySt5XJmBo:VRAyZ6WhjdpvgeuhaUfhmpHRxyS3Jm
Static task
static1
Behavioral task
behavioral1
Sample
bc290eadffd4393ed0eb53833d81b4dc2b35205c16a9b4f2f5858889e17f5307.exe
Resource
win7-20230831-en
Malware Config
Extracted
stealc
http://elijahdiego.top
-
url_path
/e9c345fc99a4e67e.php
Targets
-
-
Target
bc290eadffd4393ed0eb53833d81b4dc2b35205c16a9b4f2f5858889e17f5307.exe
-
Size
231KB
-
MD5
31d89c2bbe767ba9327a444a53e1877b
-
SHA1
7870f2a331a793f7c522238dbf29f572ef639370
-
SHA256
bc290eadffd4393ed0eb53833d81b4dc2b35205c16a9b4f2f5858889e17f5307
-
SHA512
18c67ca8eff392fe1a18c3625ef668aa4239453f8a49de2cfc090a9a03115177c783fac50bf1c6f389845aad96f7a6e5465e190448ba167b8016f7a4b190637f
-
SSDEEP
3072:8GRAyZ+3WlzjdpnveRnH5uNZYhaRKfjlHGpHIZ8d9xySt5XJmBo:VRAyZ6WhjdpvgeuhaUfhmpHRxyS3Jm
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-