General
-
Target
PcOptimizer.exe
-
Size
1.6MB
-
Sample
240118-d6djcscabp
-
MD5
31578327d2ce62a033df100eb8e5db21
-
SHA1
abbf90eb2b2064181f9d2e2b3839d32b8608607f
-
SHA256
ccb9b6b18a926cb5429ce957478416a5bbe19b9124521d1974454d0ff0fde17e
-
SHA512
6980ee171e1614414bfd3b2314adeab2df00a1447449ddf7f41ea9328ae4dc99cdd3850541f22a6ba080d40e84e66fb4b085eb8e37aa187d10e7af4693e0cdc8
-
SSDEEP
49152:JkTq24GjdGSiqkqXfd+/9AqYanieKdsS:J1EjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
PcOptimizer.exe
Resource
win10-20231215-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1197035124232028301/sHUczEA6_tw3a11veY_04e7UYZLqHfIVPsGIZS0Vw4ap6GVt8E0gj0TGwqKyyPopNMrA
Targets
-
-
Target
PcOptimizer.exe
-
Size
1.6MB
-
MD5
31578327d2ce62a033df100eb8e5db21
-
SHA1
abbf90eb2b2064181f9d2e2b3839d32b8608607f
-
SHA256
ccb9b6b18a926cb5429ce957478416a5bbe19b9124521d1974454d0ff0fde17e
-
SHA512
6980ee171e1614414bfd3b2314adeab2df00a1447449ddf7f41ea9328ae4dc99cdd3850541f22a6ba080d40e84e66fb4b085eb8e37aa187d10e7af4693e0cdc8
-
SSDEEP
49152:JkTq24GjdGSiqkqXfd+/9AqYanieKdsS:J1EjdGSiqkqXf0FLYW
Score10/10-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-