General
-
Target
tmp
-
Size
328KB
-
Sample
240214-xqq93aad9y
-
MD5
1fe48fa76472584357a863654891de62
-
SHA1
038896466f0a284367e1a6a12aade2d02c0e7b3c
-
SHA256
8bbba57340913cb936decf9e9011765226ed96ab27daeb9c6ddb790a5683aa4c
-
SHA512
fd6fe5f52209ce54c52f71f0da618cc28e69d90f0c7ec81b7ecd941b28c76084155beb86befe7693c21e3a88a55bdcfca6f2c59771c21189bfc79e2728287c7f
-
SSDEEP
6144:ajG7iKC4XotnXZYfcyGkicRPzW3JZhfMBpyj1O1N:b7iKC44FZvyGkRRrW5ZZ0pwO1
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
Malware Config
Extracted
stealc
http://185.172.128.24
-
url_path
/f993692117a3fda2.php
Targets
-
-
Target
tmp
-
Size
328KB
-
MD5
1fe48fa76472584357a863654891de62
-
SHA1
038896466f0a284367e1a6a12aade2d02c0e7b3c
-
SHA256
8bbba57340913cb936decf9e9011765226ed96ab27daeb9c6ddb790a5683aa4c
-
SHA512
fd6fe5f52209ce54c52f71f0da618cc28e69d90f0c7ec81b7ecd941b28c76084155beb86befe7693c21e3a88a55bdcfca6f2c59771c21189bfc79e2728287c7f
-
SSDEEP
6144:ajG7iKC4XotnXZYfcyGkicRPzW3JZhfMBpyj1O1N:b7iKC44FZvyGkRRrW5ZZ0pwO1
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-