General
-
Target
0656c03fdd06fb28a009ab7e304dd051d7c735089e1729c4f2d7425e574a9856
-
Size
2.3MB
-
Sample
231212-bcb3bsdea9
-
MD5
0bb3ba8df7826a13ca73cd03a1e43dc2
-
SHA1
b76b62eba59bcb72296626609ba692ca3a175c1a
-
SHA256
0656c03fdd06fb28a009ab7e304dd051d7c735089e1729c4f2d7425e574a9856
-
SHA512
83326fe633afc214e3fb4c9570ae9b8e688da5530f28b82534705b3d84d153f70279a355a369bfc3e0437a5a569914b86c0827308a69b0136f3164f325808b79
-
SSDEEP
49152:ON2s5FXQ4EmojLjCRELVf7Avil+dHIsLp1thIikN+6u2hsy:OLzX71oDCRAZUviAHImDqia7hsy
Static task
static1
Malware Config
Extracted
stealc
http://77.91.76.36
-
url_path
/3886d2276f6914c4.php
Targets
-
-
Target
0656c03fdd06fb28a009ab7e304dd051d7c735089e1729c4f2d7425e574a9856
-
Size
2.3MB
-
MD5
0bb3ba8df7826a13ca73cd03a1e43dc2
-
SHA1
b76b62eba59bcb72296626609ba692ca3a175c1a
-
SHA256
0656c03fdd06fb28a009ab7e304dd051d7c735089e1729c4f2d7425e574a9856
-
SHA512
83326fe633afc214e3fb4c9570ae9b8e688da5530f28b82534705b3d84d153f70279a355a369bfc3e0437a5a569914b86c0827308a69b0136f3164f325808b79
-
SSDEEP
49152:ON2s5FXQ4EmojLjCRELVf7Avil+dHIsLp1thIikN+6u2hsy:OLzX71oDCRAZUviAHImDqia7hsy
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-