General
-
Target
b9c81870733125e8ce37bd69ca0dd5fa.bin
-
Size
140KB
-
Sample
240108-d5l44sbdg7
-
MD5
67bab0daa4624aa4d36bb348602abfef
-
SHA1
b00c7a1cb347b3007fb71557353c53228a072c42
-
SHA256
69230b88fdebae6ed7cfee6e835bb659e9f197cd1ea7f047e9d951e98c5f9e01
-
SHA512
dd9a2f3a3ba4b82c80b1ca51c57a1e62b6ed0b650a9c01649717a71a3c2c04384f94259d79b677fdd42f69d85582cd256689f730d5031a965ca938728502ffb0
-
SSDEEP
3072:0ojjiM+jppy9IXt3AAteW8XZZL9BDcwojdKN1h0NJ:0o7+jpp79AAmXLjg9J
Static task
static1
Behavioral task
behavioral1
Sample
4e90cbff460414a9bd5b8ba2c9680bca2f85d3a38b4d2b2242f8c176d102f72f.exe
Resource
win7-20231215-en
Malware Config
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Targets
-
-
Target
4e90cbff460414a9bd5b8ba2c9680bca2f85d3a38b4d2b2242f8c176d102f72f.exe
-
Size
202KB
-
MD5
b9c81870733125e8ce37bd69ca0dd5fa
-
SHA1
331ce4e42c1f05984d0dfe8def855513f2209711
-
SHA256
4e90cbff460414a9bd5b8ba2c9680bca2f85d3a38b4d2b2242f8c176d102f72f
-
SHA512
18678d2cfb07fdd05c50ac41d12d12c5e47cd44d18931ee5c3ba94510093ca155dbda0580df87d03a9885c9c6034a49bc90a9fde73c9a601f48d654db56c0632
-
SSDEEP
3072:+WKxaOMqLfy1wPgNY01xznuiOsL7dNUUs/VkVbs+5XOORED9:XK/LK2PgTdIsL7/UUkVqy
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-