General
-
Target
9ec2e9f63019496c7974d1434c3040cbb89164fa02d39aa698376ac3067530c1
-
Size
403KB
-
Sample
240328-qjpdkagb58
-
MD5
eb9ff03087153fed10ce24f9be84dad1
-
SHA1
620dd38967b5556d0c8612c652b1215ea6fc34dc
-
SHA256
9ec2e9f63019496c7974d1434c3040cbb89164fa02d39aa698376ac3067530c1
-
SHA512
e7404de8e92cfc34f5f4bfa8d5d8f155b090bff05a8f1af92915600d2e392e25f58f8f186c7afba7260c35a7b82a593029efb2271506b40956e03ee90375c859
-
SSDEEP
6144:J84ZTIPSC0Pob2+LCR1CSq84CgRgXWTd3tnnYPR40J22Z3fZI/tDgogE1:24lSSnoFLl84rgXm9nYnVv2hgogE1
Static task
static1
Behavioral task
behavioral1
Sample
9ec2e9f63019496c7974d1434c3040cbb89164fa02d39aa698376ac3067530c1.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
9ec2e9f63019496c7974d1434c3040cbb89164fa02d39aa698376ac3067530c1
-
Size
403KB
-
MD5
eb9ff03087153fed10ce24f9be84dad1
-
SHA1
620dd38967b5556d0c8612c652b1215ea6fc34dc
-
SHA256
9ec2e9f63019496c7974d1434c3040cbb89164fa02d39aa698376ac3067530c1
-
SHA512
e7404de8e92cfc34f5f4bfa8d5d8f155b090bff05a8f1af92915600d2e392e25f58f8f186c7afba7260c35a7b82a593029efb2271506b40956e03ee90375c859
-
SSDEEP
6144:J84ZTIPSC0Pob2+LCR1CSq84CgRgXWTd3tnnYPR40J22Z3fZI/tDgogE1:24lSSnoFLl84rgXm9nYnVv2hgogE1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-