General
-
Target
31c6a028ab500d3b8c6d53c5827ffdd773146a55306f3196271dce2f548aa020.exe
-
Size
414KB
-
Sample
240326-cklgeaee8s
-
MD5
32da82af183c6de4e3874d5760b65168
-
SHA1
7be8f0dc1bfc8f172b407a366f19aec9d30684c4
-
SHA256
31c6a028ab500d3b8c6d53c5827ffdd773146a55306f3196271dce2f548aa020
-
SHA512
03927e0a5eaf71b0469a41ede18b8a6eae2ed569da6e67c3dac33d7d78b3c1262ef2729da39cfd0c8856cc1e25cad9bb2c7f3a0b1c1690a79f20dee8384cf147
-
SSDEEP
6144:kUBes6jA+uS+YRiXbr41hssVhBM+gOmHs0EE2ovTCsqXd3zCEKV:1j6U+ulYRYv4zx4pMBAvTmFKV
Static task
static1
Behavioral task
behavioral1
Sample
31c6a028ab500d3b8c6d53c5827ffdd773146a55306f3196271dce2f548aa020.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
31c6a028ab500d3b8c6d53c5827ffdd773146a55306f3196271dce2f548aa020.exe
-
Size
414KB
-
MD5
32da82af183c6de4e3874d5760b65168
-
SHA1
7be8f0dc1bfc8f172b407a366f19aec9d30684c4
-
SHA256
31c6a028ab500d3b8c6d53c5827ffdd773146a55306f3196271dce2f548aa020
-
SHA512
03927e0a5eaf71b0469a41ede18b8a6eae2ed569da6e67c3dac33d7d78b3c1262ef2729da39cfd0c8856cc1e25cad9bb2c7f3a0b1c1690a79f20dee8384cf147
-
SSDEEP
6144:kUBes6jA+uS+YRiXbr41hssVhBM+gOmHs0EE2ovTCsqXd3zCEKV:1j6U+ulYRYv4zx4pMBAvTmFKV
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-