General
-
Target
tmp
-
Size
220KB
-
Sample
240125-vxajsacdfk
-
MD5
ca4524d6dcbf612d26136531cfe42304
-
SHA1
58869b0cd033706048cc83ca4d22d659fa94f2f6
-
SHA256
ee26742f1bab476b9a61e1ace78883e3fd0d0534c35a9839d333b6bc0274f7e0
-
SHA512
48cb6061b052a988a504f0ad0818bbd5c096b0a5853a2563d8aafd57261829682732ee373504d5956ee81187dc6bad0fe8d1b9f311706e5aa35b78e4a3b0e06c
-
SSDEEP
3072:isWjEgVMuYCYhDgq0fsE13ZTouFbqSGY/2HKnOC7vIjeBrmf:iljEgVMuNNsK3CuBPjWKnf
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
Malware Config
Extracted
stealc
http://185.172.128.24
-
url_path
/40d570f44e84a4�4.php
Targets
-
-
Target
tmp
-
Size
220KB
-
MD5
ca4524d6dcbf612d26136531cfe42304
-
SHA1
58869b0cd033706048cc83ca4d22d659fa94f2f6
-
SHA256
ee26742f1bab476b9a61e1ace78883e3fd0d0534c35a9839d333b6bc0274f7e0
-
SHA512
48cb6061b052a988a504f0ad0818bbd5c096b0a5853a2563d8aafd57261829682732ee373504d5956ee81187dc6bad0fe8d1b9f311706e5aa35b78e4a3b0e06c
-
SSDEEP
3072:isWjEgVMuYCYhDgq0fsE13ZTouFbqSGY/2HKnOC7vIjeBrmf:iljEgVMuNNsK3CuBPjWKnf
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-