General
-
Target
aaba138e7e153d2f77eead98fa84ad73f499081057cefa0d77c5bb705c4c818d
-
Size
366KB
-
Sample
240315-rxdpnaah7z
-
MD5
ee104db3a5b8af44395b171c84b61b4e
-
SHA1
0ed9f8feabb162c4caced149cc60390b883210a9
-
SHA256
aaba138e7e153d2f77eead98fa84ad73f499081057cefa0d77c5bb705c4c818d
-
SHA512
04d221faf98e3b4817c2012677b61e8668e0c8f7aa4625398ff751b94beb326a80586476c3933a8321807f4c63a2bd7388593ca7fdfe3c2789a92c8dc69f28f4
-
SSDEEP
6144:cvPB0woB2e3eC1nZ5h6c97hKXKzUVM3TfiuT:mPT7CljhpYKHzT
Static task
static1
Behavioral task
behavioral1
Sample
aaba138e7e153d2f77eead98fa84ad73f499081057cefa0d77c5bb705c4c818d.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.145
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
aaba138e7e153d2f77eead98fa84ad73f499081057cefa0d77c5bb705c4c818d
-
Size
366KB
-
MD5
ee104db3a5b8af44395b171c84b61b4e
-
SHA1
0ed9f8feabb162c4caced149cc60390b883210a9
-
SHA256
aaba138e7e153d2f77eead98fa84ad73f499081057cefa0d77c5bb705c4c818d
-
SHA512
04d221faf98e3b4817c2012677b61e8668e0c8f7aa4625398ff751b94beb326a80586476c3933a8321807f4c63a2bd7388593ca7fdfe3c2789a92c8dc69f28f4
-
SSDEEP
6144:cvPB0woB2e3eC1nZ5h6c97hKXKzUVM3TfiuT:mPT7CljhpYKHzT
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-