General
-
Target
file.exe
-
Size
279KB
-
Sample
231121-mr8wdsee71
-
MD5
867b0774647407708f8167922d0d6906
-
SHA1
9724ad62f041257a28d17ddfe68308e213edaa03
-
SHA256
b2ae2cf6d1b4cd0e5a2c48189930395f00b59be375dd3e7933b3a4027b4e8bc0
-
SHA512
628a5c91224b6f90ad927aa9229221dc5b6d4d32ab278c0a4ab24cd1d5e3c4258ee5962fee1009e8e336ee2badf526c19265370fc3533a8d256aecf3ffc64855
-
SSDEEP
3072:vWADHfYR0+H2Syw9pd8LoR985ZyTQGLO/N2jmQTHH5LuMzD:J/YTHPyw9v8LoRcyTQnNy5b
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231023-en
Malware Config
Extracted
stealc
http://danielhamerling.icu
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
file.exe
-
Size
279KB
-
MD5
867b0774647407708f8167922d0d6906
-
SHA1
9724ad62f041257a28d17ddfe68308e213edaa03
-
SHA256
b2ae2cf6d1b4cd0e5a2c48189930395f00b59be375dd3e7933b3a4027b4e8bc0
-
SHA512
628a5c91224b6f90ad927aa9229221dc5b6d4d32ab278c0a4ab24cd1d5e3c4258ee5962fee1009e8e336ee2badf526c19265370fc3533a8d256aecf3ffc64855
-
SSDEEP
3072:vWADHfYR0+H2Syw9pd8LoR985ZyTQGLO/N2jmQTHH5LuMzD:J/YTHPyw9v8LoRcyTQnNy5b
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-