General
-
Target
60cce5069db7901558fc6a2bbbf100c9939538f87a40869c13dba9794f656a7d
-
Size
431KB
-
Sample
240328-mxrjasge65
-
MD5
bbeda52fe430bae59f8d0c2b95bf46ef
-
SHA1
6c413ba20e5f63949266fd24e91cda154d1c0626
-
SHA256
60cce5069db7901558fc6a2bbbf100c9939538f87a40869c13dba9794f656a7d
-
SHA512
0ce84cc8b33b4b29d797b526393bd5fe754dec6d427695f91654954c20ed70d6e52ebd16c26e27bf6e5fbbafef69a08d5d6c8be925b83642f520b8d9a49ae3a6
-
SSDEEP
6144:rmvZ1h6GE0+qJ8ET7z8i8pMbNcYwnrqXzxM4aDj2ZEsUoKN+639RXV:SvfsGEQG4v8jMbenrezK4aD7oK/NxV
Static task
static1
Behavioral task
behavioral1
Sample
60cce5069db7901558fc6a2bbbf100c9939538f87a40869c13dba9794f656a7d.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
60cce5069db7901558fc6a2bbbf100c9939538f87a40869c13dba9794f656a7d
-
Size
431KB
-
MD5
bbeda52fe430bae59f8d0c2b95bf46ef
-
SHA1
6c413ba20e5f63949266fd24e91cda154d1c0626
-
SHA256
60cce5069db7901558fc6a2bbbf100c9939538f87a40869c13dba9794f656a7d
-
SHA512
0ce84cc8b33b4b29d797b526393bd5fe754dec6d427695f91654954c20ed70d6e52ebd16c26e27bf6e5fbbafef69a08d5d6c8be925b83642f520b8d9a49ae3a6
-
SSDEEP
6144:rmvZ1h6GE0+qJ8ET7z8i8pMbNcYwnrqXzxM4aDj2ZEsUoKN+639RXV:SvfsGEQG4v8jMbenrezK4aD7oK/NxV
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-