General
-
Target
79862d1e71e51ca677b035f3be29c062.bin
-
Size
144KB
-
Sample
231114-cm27yaga4y
-
MD5
36da78631bc6cc2dc6762575d3afdb9f
-
SHA1
c38e2a5e1dbd728e3840c62a1e52efba7e7acf16
-
SHA256
1a5324d0f52de2e2ed70ee8098c26f84d752d5db3838d6d9c1073313dfb4e244
-
SHA512
22322dabe8e7fb2d2743660b16f62a696ac55436f9e43db11c91741c82b02ff035f12c438d8503a1dfa775e9f3f464ec81890d0df54e13e58e2a63f8da8015d1
-
SSDEEP
1536:TdOzBSoctxu/L5rdqxIUuxW0JsuhqO0BjpWxMeZtHiiCt69EqNfJ1/Dh0Laysu2v:4pJdu2xWFivu3iC4Dn1/L+TJbdCfMM
Static task
static1
Behavioral task
behavioral1
Sample
c9ea3ac3016093a34f864a52b854e01d655be9f1848fc6de098c79a3d560fc19.exe
Resource
win7-20231020-en
Malware Config
Extracted
stealc
http://bernardofata.icu
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
c9ea3ac3016093a34f864a52b854e01d655be9f1848fc6de098c79a3d560fc19.exe
-
Size
240KB
-
MD5
79862d1e71e51ca677b035f3be29c062
-
SHA1
15f2769a04073121821f9221a051c155f11ac8cf
-
SHA256
c9ea3ac3016093a34f864a52b854e01d655be9f1848fc6de098c79a3d560fc19
-
SHA512
f7eb3f556209b0b52c8139c5d65e812f583be35ee2bd3903e957aeb56e0e74c7e00a8d98e8343e3a6c4b9342f9e56095a46f3fca2c6167c93f7d931288461818
-
SSDEEP
3072:WiyROOL6CncmaKNyg+HkRaehoWAF75V1hGycABjfiSRP9qr03M:Wb0OL6o1+HkJoFFP1hGycABjfJ9ql
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-