General
-
Target
file.exe
-
Size
201KB
-
Sample
231120-q7h7fsgc83
-
MD5
85985237380073e38b9572bc47f34392
-
SHA1
c36ee16ea338b9b1244ce2d39e0e97d714963417
-
SHA256
6c92d4783045aee396d42a4d9c93d61689d61021d3988b5f12c8ad9f2b0ab233
-
SHA512
ba9d7579019f243e9e7274b2c5f2e244da51ddfbf784dc51a13dc2fe34924ebf4827545d0747a1ac4fb0a2d0b39b7b1bdc12b2ff3327c0935231eb5012f98149
-
SSDEEP
3072:VadoYsjQwSmwOkuC/pnVuj8R9T5Ce/N9fcISZyoX6bv:VKIQrm/kuChnVAc9TU6zET6
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231020-en
Malware Config
Extracted
stealc
http://danielhamerling.icu
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
file.exe
-
Size
201KB
-
MD5
85985237380073e38b9572bc47f34392
-
SHA1
c36ee16ea338b9b1244ce2d39e0e97d714963417
-
SHA256
6c92d4783045aee396d42a4d9c93d61689d61021d3988b5f12c8ad9f2b0ab233
-
SHA512
ba9d7579019f243e9e7274b2c5f2e244da51ddfbf784dc51a13dc2fe34924ebf4827545d0747a1ac4fb0a2d0b39b7b1bdc12b2ff3327c0935231eb5012f98149
-
SSDEEP
3072:VadoYsjQwSmwOkuC/pnVuj8R9T5Ce/N9fcISZyoX6bv:VKIQrm/kuChnVAc9TU6zET6
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-