General
-
Target
tmp
-
Size
2.4MB
-
Sample
240110-nr678sefek
-
MD5
929309bfd9b22eeddc2bc4eb5f705bba
-
SHA1
623af0224270e4be9b7dbffc33defa47c8437041
-
SHA256
eb8daa3bbd914c5356559929d7fd7e1132c9b0f7196fc12c779256bd4412c71d
-
SHA512
d23926e212e1fc67ee2ada23897c1b47eaa54530b961564e4c22fa93853ff033cf14c87ae10cb62c990df4e8870d7d73fa8eac8edeae2403362a56c13b77ac9a
-
SSDEEP
49152:vV2s5FXQ4EmojLjCRELVf7Avil+dHIsLp1thIikN+6u2hsP:vDzX71oDCRAZUviAHImDqia7hsP
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231129-en
Malware Config
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Targets
-
-
Target
tmp
-
Size
2.4MB
-
MD5
929309bfd9b22eeddc2bc4eb5f705bba
-
SHA1
623af0224270e4be9b7dbffc33defa47c8437041
-
SHA256
eb8daa3bbd914c5356559929d7fd7e1132c9b0f7196fc12c779256bd4412c71d
-
SHA512
d23926e212e1fc67ee2ada23897c1b47eaa54530b961564e4c22fa93853ff033cf14c87ae10cb62c990df4e8870d7d73fa8eac8edeae2403362a56c13b77ac9a
-
SSDEEP
49152:vV2s5FXQ4EmojLjCRELVf7Avil+dHIsLp1thIikN+6u2hsP:vDzX71oDCRAZUviAHImDqia7hsP
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-