Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
10-02-2024 20:22
Behavioral task
behavioral1
Sample
stealer.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
stealer.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
creal.pyc
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
creal.pyc
Resource
win10v2004-20231215-en
General
-
Target
stealer.exe
-
Size
16.0MB
-
MD5
81da6189145c24816d35bf038845e753
-
SHA1
741dc8f77ff22f23450ab362054889828dfdbf3a
-
SHA256
c0308e2ea71ff40ce878556504ed644435ec61502bd5d01941ed632ccec029f9
-
SHA512
1dce39462761bff379360e3a80938bba27c7c429481fa476f54623f836f284f03dd692a4f846116ec27f4aaa5776698fb757affbd3d28e0befee3f6be1f8bf11
-
SSDEEP
393216:bEkZgf8iSNPG7NmiZoW1+TtIiFGuvB5IjWqn6eCz1kypRXiWCoaa:bRbioKEAl1QtIZS3ILn6ehyaVoaa
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2672 stealer.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2672 2136 stealer.exe 28 PID 2136 wrote to memory of 2672 2136 stealer.exe 28 PID 2136 wrote to memory of 2672 2136 stealer.exe 28
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.7MB
MD5550288a078dffc3430c08da888e70810
SHA101b1d31f37fb3fd81d893cc5e4a258e976f5884f
SHA256789a42ac160cef98f8925cb347473eeeb4e70f5513242e7faba5139ba06edf2d
SHA5127244432fc3716f7ef27630d4e8fbc8180a2542aa97a01d44dca260ab43966dd8ac98b6023400b0478a4809aace1a128f1f4d6e544f2e591a5b436fd4c8a9d723
-
Filesize
6.0MB
MD5bc3ae6a34519f53f5863972dd2452e04
SHA193c6c3a55972740f58b3f1e40504fa9cb0a9329e
SHA256fdd1e1d153305a3ebd56c18fc9ea1e36e2eeb1bd50886afeafcda2349b5774e5
SHA512e93c0d4a8ba9a834bae9c1955726866783369aa54dada60b035906adb7e045c3d2d230cd84f06813a02807f2a3acac5891832e639eb32cfbd3474c888807c360