General
-
Target
build.exe
-
Size
1.6MB
-
Sample
240128-2lespabgf4
-
MD5
250114fc325e32139aa68c458e697830
-
SHA1
af892053b7b94d33167e103dcd832aa066d68192
-
SHA256
55dcd1490fe7d1f7fb0ada01cc79b3e2b113ac16a5e8d09c926ccb399a0f2f49
-
SHA512
79e8c65a3d46409cdeb138b26c9b8d098131d0ad86eb17b5db67ec95525a8754765e75e2f2f29c37de7ec3af829eb774f239667aedbc00aef5869df34d0f52a9
-
SSDEEP
49152:7kTq24GjdGSiqkqXfd+/9AqYanieKdsE:71EjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
build.exe
Resource
win10-20231215-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1201288796562538517/o6-Ku-dNscXZhObTEtbm_lFKoJJYFvSFSt6SoCwEtsOVekRR7aaNTA4KxzGGcBqj_FIA
Targets
-
-
Target
build.exe
-
Size
1.6MB
-
MD5
250114fc325e32139aa68c458e697830
-
SHA1
af892053b7b94d33167e103dcd832aa066d68192
-
SHA256
55dcd1490fe7d1f7fb0ada01cc79b3e2b113ac16a5e8d09c926ccb399a0f2f49
-
SHA512
79e8c65a3d46409cdeb138b26c9b8d098131d0ad86eb17b5db67ec95525a8754765e75e2f2f29c37de7ec3af829eb774f239667aedbc00aef5869df34d0f52a9
-
SSDEEP
49152:7kTq24GjdGSiqkqXfd+/9AqYanieKdsE:71EjdGSiqkqXf0FLYW
Score10/10-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-