General
-
Target
Stealer.exe
-
Size
1.7MB
-
Sample
240214-rp7mrsea63
-
MD5
796bdd6562d082791632868158563e4b
-
SHA1
f079f0d21a2ed45557b1446c4921021e7b93ccb5
-
SHA256
c4f5af43a7dfbf4a7e9b679cce1cb0b574e6050f9f26e84c2bd674722c4fa049
-
SHA512
fd03697b31d094171310035d352086885bb8f150d9461b716ed197655a1d282c8898a0c48856ccd0ef27bdc7706216be8e977657aee5681bc19087e7da4de2e4
-
SSDEEP
49152:Rm3V5CdiVW6pBQo/RXH5MPoYvnqrIOYE54yAFsAo8HP/:Y3VodOW6Ld/JHWPonIfydv8HP/
Behavioral task
behavioral1
Sample
Stealer.exe
Resource
win10-20231215-en
Malware Config
Targets
-
-
Target
Stealer.exe
-
Size
1.7MB
-
MD5
796bdd6562d082791632868158563e4b
-
SHA1
f079f0d21a2ed45557b1446c4921021e7b93ccb5
-
SHA256
c4f5af43a7dfbf4a7e9b679cce1cb0b574e6050f9f26e84c2bd674722c4fa049
-
SHA512
fd03697b31d094171310035d352086885bb8f150d9461b716ed197655a1d282c8898a0c48856ccd0ef27bdc7706216be8e977657aee5681bc19087e7da4de2e4
-
SSDEEP
49152:Rm3V5CdiVW6pBQo/RXH5MPoYvnqrIOYE54yAFsAo8HP/:Y3VodOW6Ld/JHWPonIfydv8HP/
Score7/10-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-