General
-
Target
0b2fb9c3e84fb481f2d164dcbd165799d497ac007defe976fd72ed17bb1d3fcd
-
Size
256KB
-
Sample
240320-aj1tlacb7y
-
MD5
9c99ad693d116d99337c61f7704e57fe
-
SHA1
145baf9186bf3582e412145f2c36129421acb0d9
-
SHA256
0b2fb9c3e84fb481f2d164dcbd165799d497ac007defe976fd72ed17bb1d3fcd
-
SHA512
297b1d0ad13e86b7fd089f1d6c8b82ed97b4cfe92a8ff37ade4f9257f8424ccf6c2366c1d0f7cfb1cff1a1ad7d12db222878cf9c04c38d91baacfff962b19ba5
-
SSDEEP
3072:6wnPDdpm9wNw2coM8/XmmlM/VBKiMKhHQForiARVF8TMCkP0/:xnPDdpme3r3XBMtBbYmriKVkk
Static task
static1
Behavioral task
behavioral1
Sample
0b2fb9c3e84fb481f2d164dcbd165799d497ac007defe976fd72ed17bb1d3fcd.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
0b2fb9c3e84fb481f2d164dcbd165799d497ac007defe976fd72ed17bb1d3fcd.exe
Resource
win11-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.210
-
url_path
/f993692117a3fda2.php
Targets
-
-
Target
0b2fb9c3e84fb481f2d164dcbd165799d497ac007defe976fd72ed17bb1d3fcd
-
Size
256KB
-
MD5
9c99ad693d116d99337c61f7704e57fe
-
SHA1
145baf9186bf3582e412145f2c36129421acb0d9
-
SHA256
0b2fb9c3e84fb481f2d164dcbd165799d497ac007defe976fd72ed17bb1d3fcd
-
SHA512
297b1d0ad13e86b7fd089f1d6c8b82ed97b4cfe92a8ff37ade4f9257f8424ccf6c2366c1d0f7cfb1cff1a1ad7d12db222878cf9c04c38d91baacfff962b19ba5
-
SSDEEP
3072:6wnPDdpm9wNw2coM8/XmmlM/VBKiMKhHQForiARVF8TMCkP0/:xnPDdpme3r3XBMtBbYmriKVkk
Score10/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-