General

  • Target

    2_stealer

  • Size

    226KB

  • MD5

    a09c37144ca538b0bc4499bf59c691f1

  • SHA1

    eb997ac06e1cf56add73e5e4eed3c10a297d4bd5

  • SHA256

    45d58041f3aacdf2d3536c39e1db81e23e30c6372ca2bd3be8b2675d472b5d44

  • SHA512

    b449997aa327b281ceade8f11a14bdf1e197fb86e7dffbcfcb3d59c09532108c317f437320b267818e2919c06da21d31db4b6dca745470f7a1ed4f37455afebf

  • SSDEEP

    3072:NMU8dW6hNmf/ft5OPQFFlNqgAJcxoNF+rSoJdjayW+RCD9KrbLQ5inPCCb7bv/h1:NMPcnTMkFzqylSofjamrbLB/WEO5

Malware Config

Extracted

Family

jester

Botnet

monika_galager

C2

http://jesterdcuxzbey4xvlwwheoecpltru5be2mzuk4w7a7nrhckdjjhrbyd.onion/report/monika_galager

https://api.anonfiles.com/upload?token=d26d620842507144

Mutex

c6b4a73b-035e-4027-8c9d-f30fcd7f128e

Attributes
  • license_key

    2389157FE6BD3ADCBC3E0EAEF2136325

Signatures

  • Detects Eternity stealer 1 IoCs
  • Eternity family
  • Jester family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2_stealer
    .exe windows:4 windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections