General
-
Target
tmp
-
Size
238KB
-
Sample
240104-qtbkfshahk
-
MD5
9c8286705ed6c40606780a1ee1615462
-
SHA1
2b93260b475e845f1cf25fb5e0040e7a77a489bf
-
SHA256
f94a12e629297139c866ad2396dc2d14bfb3f6ec51fcbb723cdb0e2c65e3fbcb
-
SHA512
4545431c0f086b092716476e601ba89f8dc7767cd437d83b53f264567b01f80916308a02c6092f5fb77d18c62dbb15b5a56e907ac4accb20058b62ce03ca0fda
-
SSDEEP
3072:z/iLk7we664kHnkEvap5gOMolWNESFYSg9Uv+LQJ6T/ixt7VP:z/iLyiWkES5jKESuB40EH
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
Malware Config
Extracted
stealc
http://5.42.64.41
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
tmp
-
Size
238KB
-
MD5
9c8286705ed6c40606780a1ee1615462
-
SHA1
2b93260b475e845f1cf25fb5e0040e7a77a489bf
-
SHA256
f94a12e629297139c866ad2396dc2d14bfb3f6ec51fcbb723cdb0e2c65e3fbcb
-
SHA512
4545431c0f086b092716476e601ba89f8dc7767cd437d83b53f264567b01f80916308a02c6092f5fb77d18c62dbb15b5a56e907ac4accb20058b62ce03ca0fda
-
SSDEEP
3072:z/iLk7we664kHnkEvap5gOMolWNESFYSg9Uv+LQJ6T/ixt7VP:z/iLyiWkES5jKESuB40EH
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-