General
-
Target
tmp
-
Size
404KB
-
Sample
240326-ppnhsadb2z
-
MD5
b8d922472d6da5b157598c94b8677fa5
-
SHA1
470c464307f86b53b7ed9d4785e68d1b12599448
-
SHA256
458e3d9f3f51d58101a3b4d8496bceed86391b80c68aeba4aa1411c930094d8a
-
SHA512
e24381bb55e8ba4216f72dcb520854265c0da7e1a87b18438999a217de50abebd9a6a5f9532ebea90a35599ee3217a1ec6780ef61f584a0d7604acc17e7fbf10
-
SSDEEP
12288:5PllhDeZHXenIVgJsvPgQcmyNlVTJOUP33Wnan:5PbcHunJsvPDAlhJX/Wnan
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
tmp
-
Size
404KB
-
MD5
b8d922472d6da5b157598c94b8677fa5
-
SHA1
470c464307f86b53b7ed9d4785e68d1b12599448
-
SHA256
458e3d9f3f51d58101a3b4d8496bceed86391b80c68aeba4aa1411c930094d8a
-
SHA512
e24381bb55e8ba4216f72dcb520854265c0da7e1a87b18438999a217de50abebd9a6a5f9532ebea90a35599ee3217a1ec6780ef61f584a0d7604acc17e7fbf10
-
SSDEEP
12288:5PllhDeZHXenIVgJsvPgQcmyNlVTJOUP33Wnan:5PbcHunJsvPDAlhJX/Wnan
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-