General
-
Target
stealer.exe
-
Size
17.7MB
-
Sample
240327-2nynksch64
-
MD5
eda74fc5874c099362023377d56727fa
-
SHA1
7062793faf37a98b596055cea5d760ebd5387f02
-
SHA256
f0664db9f5e168258b2c16c5be6cca2bd95d89e2fa3be7a58ad98a16a9140652
-
SHA512
95c7ff6019fe7e011763df94b87e4a12672f718fcb1c2fb1412e54e1dc0c93250897e125b82596416c9e6a7bdbb31669379b97188efdbc289002cedf8273b856
-
SSDEEP
393216:HqPnLFXlrSQ8DOETgsvfGFHgeHkvEp6C3/q:KPLFXNSQhEw/9HS
Behavioral task
behavioral1
Sample
stealer.exe
Resource
win10-20240214-en
Malware Config
Targets
-
-
Target
stealer.exe
-
Size
17.7MB
-
MD5
eda74fc5874c099362023377d56727fa
-
SHA1
7062793faf37a98b596055cea5d760ebd5387f02
-
SHA256
f0664db9f5e168258b2c16c5be6cca2bd95d89e2fa3be7a58ad98a16a9140652
-
SHA512
95c7ff6019fe7e011763df94b87e4a12672f718fcb1c2fb1412e54e1dc0c93250897e125b82596416c9e6a7bdbb31669379b97188efdbc289002cedf8273b856
-
SSDEEP
393216:HqPnLFXlrSQ8DOETgsvfGFHgeHkvEp6C3/q:KPLFXNSQhEw/9HS
Score7/10-
Loads dropped DLL
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-