General
-
Target
5c6cd0cac67263505dc9944019895b50cab029ef655228e8294966dbc2590e35
-
Size
328KB
-
Sample
240313-a5vvgahg44
-
MD5
b8275392b74d049b7e66ed9d8bd81117
-
SHA1
c18914ddbe07649e9f61dad77ca491d66a830dfb
-
SHA256
5c6cd0cac67263505dc9944019895b50cab029ef655228e8294966dbc2590e35
-
SHA512
c4fdb96b31cd8eee3b5741b0a9ae9d13e05402f93a7113c372e42c22fee82827b3305afc573093c769da638214eac7ae94d6392ee4fd0a034fc1331e4c9cebd7
-
SSDEEP
3072:yg7lMmqtYWfOn2qGILq2ynQHTfjhOpm91ktkIJUykQ0LuDjvSeBM/NdvEl2BdrmI:77hqGWmnUYyK46IJ7kbGO73v/dWEX93
Static task
static1
Behavioral task
behavioral1
Sample
5c6cd0cac67263505dc9944019895b50cab029ef655228e8294966dbc2590e35.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
http://185.172.128.145
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
5c6cd0cac67263505dc9944019895b50cab029ef655228e8294966dbc2590e35
-
Size
328KB
-
MD5
b8275392b74d049b7e66ed9d8bd81117
-
SHA1
c18914ddbe07649e9f61dad77ca491d66a830dfb
-
SHA256
5c6cd0cac67263505dc9944019895b50cab029ef655228e8294966dbc2590e35
-
SHA512
c4fdb96b31cd8eee3b5741b0a9ae9d13e05402f93a7113c372e42c22fee82827b3305afc573093c769da638214eac7ae94d6392ee4fd0a034fc1331e4c9cebd7
-
SSDEEP
3072:yg7lMmqtYWfOn2qGILq2ynQHTfjhOpm91ktkIJUykQ0LuDjvSeBM/NdvEl2BdrmI:77hqGWmnUYyK46IJ7kbGO73v/dWEX93
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-