General
-
Target
f822b84e1343d6ca7bb5b61be7e05c26629bc552a95548db131abac2bb58e81c
-
Size
243KB
-
Sample
231116-mkdrnsac95
-
MD5
9ae873d09de38c3f1e0fb4bb264a3b61
-
SHA1
a23cbeb3b5b67869f21582f81c92db12c3192120
-
SHA256
f822b84e1343d6ca7bb5b61be7e05c26629bc552a95548db131abac2bb58e81c
-
SHA512
dd2832cedac8d911aa8183d5d6169b67f57b26b202964eb06a07e3a1a16dd242734c7261d509bcd93713dd558890e1e883c0ab84c0d839c526cbf91da62a7879
-
SSDEEP
3072:oURLapnyUUjvyeHedWBfCk3QQsDYo9ORuKHKsikF:vLaVSzmWB73gTTbI
Static task
static1
Malware Config
Extracted
stealc
http://bernardofata.icu
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
f822b84e1343d6ca7bb5b61be7e05c26629bc552a95548db131abac2bb58e81c
-
Size
243KB
-
MD5
9ae873d09de38c3f1e0fb4bb264a3b61
-
SHA1
a23cbeb3b5b67869f21582f81c92db12c3192120
-
SHA256
f822b84e1343d6ca7bb5b61be7e05c26629bc552a95548db131abac2bb58e81c
-
SHA512
dd2832cedac8d911aa8183d5d6169b67f57b26b202964eb06a07e3a1a16dd242734c7261d509bcd93713dd558890e1e883c0ab84c0d839c526cbf91da62a7879
-
SSDEEP
3072:oURLapnyUUjvyeHedWBfCk3QQsDYo9ORuKHKsikF:vLaVSzmWB73gTTbI
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-