General
-
Target
tmp
-
Size
248KB
-
Sample
240217-v4vtashb51
-
MD5
6dfbbb765abb468a1b437d9fdf73c08a
-
SHA1
6961db076b8cd97f960814de8b9c3165b085578d
-
SHA256
46c5fc9ff69640f38269815ec13d8223e731afb32f769e7f69d2e9fe9d025a9e
-
SHA512
c60f5731f8a1a24e003308a4adad08381d359b87562f6de09e8c1ce388f67c3cea9c280f618fff62932f818dbb053fb559f26863de9d7fe6268befaeff1e23c8
-
SSDEEP
3072:SOQR0Ft87ye5MnIExK/GH6UsqITR8i2wLya7ZXKV1ho5ZqVIs:1FK7UIExPH6D58i2q7ZX20qV
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20231215-en
Malware Config
Extracted
stealc
http://185.172.128.24
-
url_path
/f993692117a3fda2.php
Targets
-
-
Target
tmp
-
Size
248KB
-
MD5
6dfbbb765abb468a1b437d9fdf73c08a
-
SHA1
6961db076b8cd97f960814de8b9c3165b085578d
-
SHA256
46c5fc9ff69640f38269815ec13d8223e731afb32f769e7f69d2e9fe9d025a9e
-
SHA512
c60f5731f8a1a24e003308a4adad08381d359b87562f6de09e8c1ce388f67c3cea9c280f618fff62932f818dbb053fb559f26863de9d7fe6268befaeff1e23c8
-
SSDEEP
3072:SOQR0Ft87ye5MnIExK/GH6UsqITR8i2wLya7ZXKV1ho5ZqVIs:1FK7UIExPH6D58i2q7ZX20qV
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-