General
-
Target
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.zip
-
Size
236KB
-
Sample
240114-v7vbyachg2
-
MD5
8d78ffb82e77fcf49abb4e2a58ecb0a5
-
SHA1
b7ab16641262b614977aa734bb49ab16b76c6373
-
SHA256
e6d2263dcddfe0472da3643b0cf91781d86321fe7c731721e43a8d3ef6fa474d
-
SHA512
27a4f204ab714610590e482b83b9dfb036cb5bcb139dcd779496c5ece6f575ca9554f51b28e4fa66a9ecf7bf8fbbeb7074bc3d7c0480b4d47d324f0e910d8528
-
SSDEEP
6144:UWQRWp4QwcSwGHmPBjFzZrFwsGnTbF7VzC4v1v1kzvT:UWAiswzP5FhFMn3F5zrv1v1kz7
Static task
static1
Behavioral task
behavioral1
Sample
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe
Resource
win10v2004-20231222-en
Malware Config
Extracted
predatorstealer
http://hojokk.com/0x/
Targets
-
-
Target
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad.exe
-
Size
278KB
-
MD5
66a3124fe4ed45fae20e2bd4ee33c626
-
SHA1
fc5ef4caf4d8a51a340f6fd98ac525debcff8f30
-
SHA256
630efa1e2dc642799b867363bb36d1953884480ac29942a1ab20243a8a9620ad
-
SHA512
569bc064f465c32fd11fdd67896106778f13094e20adc739d8824f9e02508701b712bd3cfdab48782421b35acebe16bb5b0e97543db869ecaec5c1b87902b872
-
SSDEEP
6144:sU0sd0bzy1GOgofaePZ3e5fv+vc6X+olz:XzHGOgovPwcXbl
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-