General
-
Target
file.exe
-
Size
254KB
-
Sample
231022-sn1y9saa9t
-
MD5
4e394b1a68dc5009383320218d1d9366
-
SHA1
b7e27e16892424388ed7875c25aa33cc36194047
-
SHA256
0d36b22f0a5a966b9f89c9fa9ad0e740e5c636560eafaf887e74d708f3f81bdf
-
SHA512
62c637d45a13ac59879a775ea66d410eb3c3e15a1b268003f723d1e840ff33b9566fb582aebe637c7362907d4debf45d67e5d9c4a430343ee19a057c7b81155c
-
SSDEEP
3072:xyBNUfBKxAtGdKP3IH9q6+JOkoo83SNLJTk56CKoeSUnvQX:seMAt6KP4Hb+JOkT8CNKHN
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Malware Config
Extracted
stealc
http://wy�ttsebastian.top
-
url_path
/e9c345fc99a4e67e.php
Targets
-
-
Target
file.exe
-
Size
254KB
-
MD5
4e394b1a68dc5009383320218d1d9366
-
SHA1
b7e27e16892424388ed7875c25aa33cc36194047
-
SHA256
0d36b22f0a5a966b9f89c9fa9ad0e740e5c636560eafaf887e74d708f3f81bdf
-
SHA512
62c637d45a13ac59879a775ea66d410eb3c3e15a1b268003f723d1e840ff33b9566fb582aebe637c7362907d4debf45d67e5d9c4a430343ee19a057c7b81155c
-
SSDEEP
3072:xyBNUfBKxAtGdKP3IH9q6+JOkoo83SNLJTk56CKoeSUnvQX:seMAt6KP4Hb+JOkT8CNKHN
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-