General
-
Target
8cca55bc4e686455645f79123abec12a38998a6eae244978acf17ca8863aeb0d
-
Size
207KB
-
Sample
231120-y7ajbaac25
-
MD5
722d1650d3b4ab9e281bc660a32779da
-
SHA1
b72129732d4478e57ad9a5689508870169be2530
-
SHA256
8cca55bc4e686455645f79123abec12a38998a6eae244978acf17ca8863aeb0d
-
SHA512
92170eab96e59b6e332cc6867d05b93da1082dbe4ff06dc32782aa8eb93697c151f00aa0342a46963212cdca37c6a58ae6937cebf74363153f6a7a07b118c7d3
-
SSDEEP
3072:wnWUbhxzs7CwOSKJwn/knyOhMtRzJniuo0//d5VM3F0bvXDrk:eHzSC/SKJwn/kyOglnHnG36XD
Static task
static1
Malware Config
Extracted
stealc
http://danielhamerling.icu
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
8cca55bc4e686455645f79123abec12a38998a6eae244978acf17ca8863aeb0d
-
Size
207KB
-
MD5
722d1650d3b4ab9e281bc660a32779da
-
SHA1
b72129732d4478e57ad9a5689508870169be2530
-
SHA256
8cca55bc4e686455645f79123abec12a38998a6eae244978acf17ca8863aeb0d
-
SHA512
92170eab96e59b6e332cc6867d05b93da1082dbe4ff06dc32782aa8eb93697c151f00aa0342a46963212cdca37c6a58ae6937cebf74363153f6a7a07b118c7d3
-
SSDEEP
3072:wnWUbhxzs7CwOSKJwn/knyOhMtRzJniuo0//d5VM3F0bvXDrk:eHzSC/SKJwn/kyOglnHnG36XD
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-