General
-
Target
tmp
-
Size
238KB
-
Sample
240202-wfp4kseabn
-
MD5
14a0bb0b90ac5ca064a42f889dd0492d
-
SHA1
119a3338e0814e9071b762d8bd5fff6ea2fda28c
-
SHA256
d0a6076bc23382609a958b7d4d50a54b01d719e24bad56fa10d9da0b083349b6
-
SHA512
024697eb4e1708781467396169c65e62fef5b8d65b7c1d434d28428ee7adf7628a92c1fe29c856fc1fde443337d2c48fdd42f304b350ee9d550e377e8e7d0a74
-
SSDEEP
3072:wWTAKLhXk2EzsPq6wP7EQA2OjVNqfBki6mAX7i5HHphJnOJG:kKL9EzsPd8A2DBke0MHtO
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231129-en
Malware Config
Extracted
stealc
http://185.172.128.79
-
url_path
/3886d2276f6914c4.php
Targets
-
-
Target
tmp
-
Size
238KB
-
MD5
14a0bb0b90ac5ca064a42f889dd0492d
-
SHA1
119a3338e0814e9071b762d8bd5fff6ea2fda28c
-
SHA256
d0a6076bc23382609a958b7d4d50a54b01d719e24bad56fa10d9da0b083349b6
-
SHA512
024697eb4e1708781467396169c65e62fef5b8d65b7c1d434d28428ee7adf7628a92c1fe29c856fc1fde443337d2c48fdd42f304b350ee9d550e377e8e7d0a74
-
SSDEEP
3072:wWTAKLhXk2EzsPq6wP7EQA2OjVNqfBki6mAX7i5HHphJnOJG:kKL9EzsPd8A2DBke0MHtO
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-