General
-
Target
cc72bc96a5ff9ab174ae322f904e49e91a3feaeff26b4e1d86c071603aeebee3
-
Size
250KB
-
Sample
231103-zadedahh9w
-
MD5
4b5defbc06db301ec6fa4dbd0656cf10
-
SHA1
502ae7d7720b50c2221b1c38f9f880c818afd0ee
-
SHA256
cc72bc96a5ff9ab174ae322f904e49e91a3feaeff26b4e1d86c071603aeebee3
-
SHA512
db9d867f474da8667d7405e35d90e4011625ee106b659a34c75dbbedd40e5f983b78e7b817ad50c5b375ab069107d74886e9b76b28fe768c1f29f4142cf4670d
-
SSDEEP
3072:exWZZoM3QxDDSeXoOYyloZsSRs8kBlKMe0054SPLJLrY9+H6u:NoM3QxVXoVyksSRdL00ySPV/
Static task
static1
Malware Config
Extracted
stealc
http://williammoore.top
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
cc72bc96a5ff9ab174ae322f904e49e91a3feaeff26b4e1d86c071603aeebee3
-
Size
250KB
-
MD5
4b5defbc06db301ec6fa4dbd0656cf10
-
SHA1
502ae7d7720b50c2221b1c38f9f880c818afd0ee
-
SHA256
cc72bc96a5ff9ab174ae322f904e49e91a3feaeff26b4e1d86c071603aeebee3
-
SHA512
db9d867f474da8667d7405e35d90e4011625ee106b659a34c75dbbedd40e5f983b78e7b817ad50c5b375ab069107d74886e9b76b28fe768c1f29f4142cf4670d
-
SSDEEP
3072:exWZZoM3QxDDSeXoOYyloZsSRs8kBlKMe0054SPLJLrY9+H6u:NoM3QxVXoVyksSRdL00ySPV/
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-