General
-
Target
999efe8a7d32764901ed04b7cff249e07ad85ec3e7237e4578f11e9b29de4326.zip
-
Size
165KB
-
Sample
231119-zj1w2abd89
-
MD5
c2ddaed35bfe69f67bc6f919c706ed48
-
SHA1
a0e6e0ffcbb88a7c7075ec8c81c5f8a6a90b51a1
-
SHA256
4de17d42d7e83349943d2b73a510ba7bbb37e5def3c5b0342cd2e706b0136990
-
SHA512
f99404b510d6e2c2f85174309335f7ff23692faed5ee5839d32d35ffa790e12919d9819cc49d981f2af1bb071e22c93b5536feff3bcb6e2beb2eb058090e5950
-
SSDEEP
3072:+heTCw/WYfxjTpN1ZVCTbMgulNQ1QHE7REbJ9nqA:+hS7znp7OTo7lNaQy4JEA
Static task
static1
Behavioral task
behavioral1
Sample
999efe8a7d32764901ed04b7cff249e07ad85ec3e7237e4578f11e9b29de4326.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
999efe8a7d32764901ed04b7cff249e07ad85ec3e7237e4578f11e9b29de4326.exe
Resource
win10v2004-20231023-en
Malware Config
Extracted
stealc
http://giuliotoro.icu
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
999efe8a7d32764901ed04b7cff249e07ad85ec3e7237e4578f11e9b29de4326.exe
-
Size
254KB
-
MD5
ef45b1ac26f3fb7cac0cf85c568bb881
-
SHA1
09826670fa495347aec5ba11ca5cf04be417019e
-
SHA256
999efe8a7d32764901ed04b7cff249e07ad85ec3e7237e4578f11e9b29de4326
-
SHA512
cfd15c626aece1568311213fcc059ee24e0249f4e343a79b68f1f7b005eeb175b7b1f411b71017b564d3a9f912f9282c81e77be12f62d90d8bdacd4ffc8c826f
-
SSDEEP
3072:K9xGvZKt0iEfvg6FVs94VIg9EGbJh5j3hKrjRTRS926tyIi/p/4CY/:644tAfvFFi9Tg95hty6926IIiG
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-