General
-
Target
SecuriteInfo.com.Python.Stealer.1122.27257.27673.exe
-
Size
15.8MB
-
Sample
240119-g3rtcsgcfj
-
MD5
0c9d8eb4648d03ea683e15eec87c67b6
-
SHA1
24903492340b3a5ea077fde40cb48a041bcc8b08
-
SHA256
703f97038c9cbbe49dd6e46fb67b03814b4ac4d4f2141a39aadddc0964305881
-
SHA512
096f21839d17a53886f545e133d4fc81b36ad2b9f1350beccccfe138cbc997103106ccd7929981af2082ee3fdf15243671637bca07104921d2ff595dfef1e2e4
-
SSDEEP
393216:rXB+4uIntpUTLfhJsW+eGQRe9jo7BGcGVo/S6fWk0/:rx+RsHUTLJSW+e5Re9M3L0/
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Python.Stealer.1122.27257.27673.exe
Resource
win7-20231215-en
Malware Config
Targets
-
-
Target
SecuriteInfo.com.Python.Stealer.1122.27257.27673.exe
-
Size
15.8MB
-
MD5
0c9d8eb4648d03ea683e15eec87c67b6
-
SHA1
24903492340b3a5ea077fde40cb48a041bcc8b08
-
SHA256
703f97038c9cbbe49dd6e46fb67b03814b4ac4d4f2141a39aadddc0964305881
-
SHA512
096f21839d17a53886f545e133d4fc81b36ad2b9f1350beccccfe138cbc997103106ccd7929981af2082ee3fdf15243671637bca07104921d2ff595dfef1e2e4
-
SSDEEP
393216:rXB+4uIntpUTLfhJsW+eGQRe9jo7BGcGVo/S6fWk0/:rx+RsHUTLJSW+e5Re9M3L0/
-
Drops startup file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-