General
-
Target
file.exe
-
Size
5.0MB
-
Sample
240116-t3s3mseghq
-
MD5
9fbddfa2696d5061750e6e0ff2162c28
-
SHA1
a2cc8c949d1404058657ca7fb81854ae092762f3
-
SHA256
3555805731fe9aeb942a0859e9205481f6367547068658f57ddf38859b8b5cba
-
SHA512
ea2b807664bc4844ee92f9970ce63a12a98cc42ec23c0f893ef206d09eab9ef6e5b23f36b2671495ee6574e77b0d7cce6503a8950fc48db058037401b1cb068e
-
SSDEEP
49152:ty/agNoehGYQBcQSiiQMchTQU0Pglz1OCuFTeeoXSS0x1HMToTQFAxTi4I0HQiuq:7CU0Pg91TXKs8Tk4W+f64X
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20231215-en
Malware Config
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Targets
-
-
Target
file.exe
-
Size
5.0MB
-
MD5
9fbddfa2696d5061750e6e0ff2162c28
-
SHA1
a2cc8c949d1404058657ca7fb81854ae092762f3
-
SHA256
3555805731fe9aeb942a0859e9205481f6367547068658f57ddf38859b8b5cba
-
SHA512
ea2b807664bc4844ee92f9970ce63a12a98cc42ec23c0f893ef206d09eab9ef6e5b23f36b2671495ee6574e77b0d7cce6503a8950fc48db058037401b1cb068e
-
SSDEEP
49152:ty/agNoehGYQBcQSiiQMchTQU0Pglz1OCuFTeeoXSS0x1HMToTQFAxTi4I0HQiuq:7CU0Pg91TXKs8Tk4W+f64X
-
Detect Fabookie payload
-
Glupteba payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1