General
-
Target
1c93b99d8e1968867508692feb30aa67c0a48a2a623704f982d1dd9754125ace
-
Size
264KB
-
Sample
231117-hff9saga78
-
MD5
d3f6d40bca88051421668bd295322894
-
SHA1
5bd5d07a1d69297ace31b8851168282f99d6becb
-
SHA256
1c93b99d8e1968867508692feb30aa67c0a48a2a623704f982d1dd9754125ace
-
SHA512
2e940c6881e6709c040a28c6b293302b48457955d71ae27180ea9e8326e302493f2adad77a83405d35ed30ea2dd20dc208217e6a654aa361f3844caee3db1c1b
-
SSDEEP
3072:WA/kRL2i1bPY5+FYGvdktSdNAaH2YVlFJqZDClXRtd3FeJ21ls/zvl:3kRL2ODYcfkMvz7xhde
Static task
static1
Malware Config
Extracted
stealc
http://bernardofata.icu
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
1c93b99d8e1968867508692feb30aa67c0a48a2a623704f982d1dd9754125ace
-
Size
264KB
-
MD5
d3f6d40bca88051421668bd295322894
-
SHA1
5bd5d07a1d69297ace31b8851168282f99d6becb
-
SHA256
1c93b99d8e1968867508692feb30aa67c0a48a2a623704f982d1dd9754125ace
-
SHA512
2e940c6881e6709c040a28c6b293302b48457955d71ae27180ea9e8326e302493f2adad77a83405d35ed30ea2dd20dc208217e6a654aa361f3844caee3db1c1b
-
SSDEEP
3072:WA/kRL2i1bPY5+FYGvdktSdNAaH2YVlFJqZDClXRtd3FeJ21ls/zvl:3kRL2ODYcfkMvz7xhde
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-