General
-
Target
2df0ef78fe988af2fd1e46eb8332ff678e43b1ee52b29ef69098851b99883dd0.exe
-
Size
253KB
-
Sample
240328-ckmdpsaf42
-
MD5
be69c6abc3f3fb4653fb97e9a42f69d4
-
SHA1
d0c593665fb6e8eab0200061f8cc5ec6b420f744
-
SHA256
2df0ef78fe988af2fd1e46eb8332ff678e43b1ee52b29ef69098851b99883dd0
-
SHA512
0cc27bbcaf7d12269f931746341412c6e551dcc1c00e8b63764c371a4edd3c2a5667c2a7f80aebdada51b0f0b71ee550b2d4e3b6e91ae4e871358cab2b0770e4
-
SSDEEP
6144:4ccfMzvudPLIzKSzQwl/Jv/c+HWTwiC4GsU64:ofMz2dDIzKSzvlxXFHGM
Static task
static1
Behavioral task
behavioral1
Sample
2df0ef78fe988af2fd1e46eb8332ff678e43b1ee52b29ef69098851b99883dd0.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.26
-
url_path
/f993692117a3fda2.php
Targets
-
-
Target
2df0ef78fe988af2fd1e46eb8332ff678e43b1ee52b29ef69098851b99883dd0.exe
-
Size
253KB
-
MD5
be69c6abc3f3fb4653fb97e9a42f69d4
-
SHA1
d0c593665fb6e8eab0200061f8cc5ec6b420f744
-
SHA256
2df0ef78fe988af2fd1e46eb8332ff678e43b1ee52b29ef69098851b99883dd0
-
SHA512
0cc27bbcaf7d12269f931746341412c6e551dcc1c00e8b63764c371a4edd3c2a5667c2a7f80aebdada51b0f0b71ee550b2d4e3b6e91ae4e871358cab2b0770e4
-
SSDEEP
6144:4ccfMzvudPLIzKSzQwl/Jv/c+HWTwiC4GsU64:ofMz2dDIzKSzvlxXFHGM
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-