General
-
Target
207754fa192fc1e34e26662a24f08a93975e57e7080ca9e2059a593b45d82732
-
Size
268KB
-
Sample
231115-yek5caeh3s
-
MD5
a261ee77f16d1ca322ccdc1006599ffc
-
SHA1
8d2748a5c5b82b0bc7c1c034dd1e2ac759c95901
-
SHA256
207754fa192fc1e34e26662a24f08a93975e57e7080ca9e2059a593b45d82732
-
SHA512
b8fb3b88e7d035bea648f85505e0f67ca10d5399fbbb72fdb0999e7a902de5a9f401d9f7f3284e1f41431071151054d904c4c877ce6035ef79e1ed6238a58c0b
-
SSDEEP
3072:SyN5fGLjJ5cdzt+Wl/kVPAhInWEGreacmnmZ3JyJ+LR2MOKTYzbck9CRL:yLjJ5c9tdMPAhcnacmnmxQ/M8b
Static task
static1
Malware Config
Extracted
stealc
http://bernardofata.icu
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
207754fa192fc1e34e26662a24f08a93975e57e7080ca9e2059a593b45d82732
-
Size
268KB
-
MD5
a261ee77f16d1ca322ccdc1006599ffc
-
SHA1
8d2748a5c5b82b0bc7c1c034dd1e2ac759c95901
-
SHA256
207754fa192fc1e34e26662a24f08a93975e57e7080ca9e2059a593b45d82732
-
SHA512
b8fb3b88e7d035bea648f85505e0f67ca10d5399fbbb72fdb0999e7a902de5a9f401d9f7f3284e1f41431071151054d904c4c877ce6035ef79e1ed6238a58c0b
-
SSDEEP
3072:SyN5fGLjJ5cdzt+Wl/kVPAhInWEGreacmnmZ3JyJ+LR2MOKTYzbck9CRL:yLjJ5c9tdMPAhcnacmnmxQ/M8b
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-