General
-
Target
3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30
-
Size
175KB
-
Sample
240204-jgan3aeher
-
MD5
2ff6ee1ef4ea7c63588e3c904e066cf4
-
SHA1
85a5d659cdcdd358af7320a39dd129601b9e8c41
-
SHA256
3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30
-
SHA512
5d00ea2bbe6384e6f4375210f485b80e8109e4c578775d146423696ce8e6b4beac93d240df329ad443f0b03d13ec46cfdd06e80d52946f662263169fffdb6713
-
SSDEEP
3072:NwLDaY5OIQfqCanVKeZccMBt1n/W77i5ftMwQx6TN45:uLDf5Yo3ZccMB3nAwQ7
Static task
static1
Behavioral task
behavioral1
Sample
3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30.exe
Resource
win7-20231215-en
Malware Config
Extracted
stealc
http://185.172.128.24
-
url_path
/40d570f44e84a454.php
Targets
-
-
Target
3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30
-
Size
175KB
-
MD5
2ff6ee1ef4ea7c63588e3c904e066cf4
-
SHA1
85a5d659cdcdd358af7320a39dd129601b9e8c41
-
SHA256
3ff61ca2f5d065e7b09031ba27eb2a7e4000359d75a788245f12fcf6bba0ae30
-
SHA512
5d00ea2bbe6384e6f4375210f485b80e8109e4c578775d146423696ce8e6b4beac93d240df329ad443f0b03d13ec46cfdd06e80d52946f662263169fffdb6713
-
SSDEEP
3072:NwLDaY5OIQfqCanVKeZccMBt1n/W77i5ftMwQx6TN45:uLDf5Yo3ZccMB3nAwQ7
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-