General
-
Target
653b45d0d346499953e960bedd361368a53ec06795a9e6f2205a2b7b74c1a102
-
Size
258KB
-
Sample
231021-1dqpjshe4t
-
MD5
1bdf1f98f86b24a5c98b037e32e65c0b
-
SHA1
6e6b818f8f4d63726c0f46f0c83907258bbb3c86
-
SHA256
653b45d0d346499953e960bedd361368a53ec06795a9e6f2205a2b7b74c1a102
-
SHA512
2b3789934d7e45f2fc28272f40ddc483ba0176fd99b9f322e1abf3b814b4ab00e163648c81b4624e28f90662eac0bff911931e0c7db8ad03bf417c95288ef190
-
SSDEEP
3072:HN1BNvcJAimc9aPYOuFTEuQHaiziTRVAOFm1SEmKy2MJ:JlCAir9aQ5EuQZORlmvdx
Static task
static1
Malware Config
Extracted
stealc
http://wy�ttsebastian.top
-
url_path
/e9c345fc99a4e67e.php
Targets
-
-
Target
653b45d0d346499953e960bedd361368a53ec06795a9e6f2205a2b7b74c1a102
-
Size
258KB
-
MD5
1bdf1f98f86b24a5c98b037e32e65c0b
-
SHA1
6e6b818f8f4d63726c0f46f0c83907258bbb3c86
-
SHA256
653b45d0d346499953e960bedd361368a53ec06795a9e6f2205a2b7b74c1a102
-
SHA512
2b3789934d7e45f2fc28272f40ddc483ba0176fd99b9f322e1abf3b814b4ab00e163648c81b4624e28f90662eac0bff911931e0c7db8ad03bf417c95288ef190
-
SSDEEP
3072:HN1BNvcJAimc9aPYOuFTEuQHaiziTRVAOFm1SEmKy2MJ:JlCAir9aQ5EuQZORlmvdx
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-