General
-
Target
tmp
-
Size
200KB
-
Sample
240312-jkykasbh6w
-
MD5
208e252ffb23886f2fbd7729fa64d997
-
SHA1
69f1041447f4900f6ae9a9fed8c8187782446cb2
-
SHA256
c64bc98a0eac5f6fed8cedf4eba8ad5721c5316e93ba4902300d8f54a2aa0aa4
-
SHA512
e10f3f75540d9919673b20412278fe559ca50311bf771d2c17fa4a95a404720119cca06b93fee9550f437c9eae06d6bcc05c6ca416727f40c38faa0995efbb3f
-
SSDEEP
3072:m6DOhNpbYI6zdn9lsS6hyNL1AQzrG2UxCk9xlo6HZ8AC:XwpMIWlk9QzJUZtaf
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.210
-
url_path
/f993692117a3fda2.php
Targets
-
-
Target
tmp
-
Size
200KB
-
MD5
208e252ffb23886f2fbd7729fa64d997
-
SHA1
69f1041447f4900f6ae9a9fed8c8187782446cb2
-
SHA256
c64bc98a0eac5f6fed8cedf4eba8ad5721c5316e93ba4902300d8f54a2aa0aa4
-
SHA512
e10f3f75540d9919673b20412278fe559ca50311bf771d2c17fa4a95a404720119cca06b93fee9550f437c9eae06d6bcc05c6ca416727f40c38faa0995efbb3f
-
SSDEEP
3072:m6DOhNpbYI6zdn9lsS6hyNL1AQzrG2UxCk9xlo6HZ8AC:XwpMIWlk9QzJUZtaf
Score10/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-