General
-
Target
sosa.exe
-
Size
802KB
-
Sample
240317-v435nsbd34
-
MD5
945d2a9d5d4e823e24248599c7729e21
-
SHA1
68129a0da152573622f47b8c76125adfd10a2e42
-
SHA256
54047ad6b586bd8a5196f0464cbdb04e22435bb6ebf0c90483ed43a0302dcfe1
-
SHA512
675a4087ddc3e7880ba6f41abaff1c06c02305d5187b35c1221077c3c8bc49a72efc50233de2418c0525fce2297d55a7044e2a8c5fd01f1228612730f7b8ad8a
-
SSDEEP
24576:dgMMGv+oVPdb7Cb4vCCI4hsw5PHtwyLhZTY+ha4P8/B8wQDrikCmN:dgMPw8FBjwQPw
Static task
static1
Behavioral task
behavioral1
Sample
sosa.exe
Resource
win10-20240221-en
Malware Config
Extracted
stealerium
https://discordapp.com/api/webhooks/1218245534754672670/2YtS8ZZZGLfJ4a53R8Upd6pJBfJGWdMziuCCB4zfvLaT1l665IRoHYEEg_nhBYAO-SIw
Extracted
44caliber
https://discordapp.com/api/webhooks/1218700109580206200/ClDSaxv7M9ZG9hShaQNLqX_ocqqkyBFA3LB7wEkB4tRPlAiZElGtyTIzFrXPhSCZ0Oci
Targets
-
-
Target
sosa.exe
-
Size
802KB
-
MD5
945d2a9d5d4e823e24248599c7729e21
-
SHA1
68129a0da152573622f47b8c76125adfd10a2e42
-
SHA256
54047ad6b586bd8a5196f0464cbdb04e22435bb6ebf0c90483ed43a0302dcfe1
-
SHA512
675a4087ddc3e7880ba6f41abaff1c06c02305d5187b35c1221077c3c8bc49a72efc50233de2418c0525fce2297d55a7044e2a8c5fd01f1228612730f7b8ad8a
-
SSDEEP
24576:dgMMGv+oVPdb7Cb4vCCI4hsw5PHtwyLhZTY+ha4P8/B8wQDrikCmN:dgMPw8FBjwQPw
-
Enumerates VirtualBox registry keys
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Looks for VirtualBox Guest Additions in registry
-
Downloads MZ/PE file
-
Looks for VMWare Tools registry key
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Checks system information in the registry
System information is often read in order to detect sandboxing environments.
-