General
-
Target
61104e2ae6c12556124680a067a454628e71a9e33e2958088c4e392541099e9f
-
Size
252KB
-
Sample
240328-zklthagh62
-
MD5
3fb912db2845b9f2c25a405056ada1f5
-
SHA1
de83fd3c4422b4432768073c9cd9faf4662b308e
-
SHA256
61104e2ae6c12556124680a067a454628e71a9e33e2958088c4e392541099e9f
-
SHA512
a595553be3b7f4f03a094e4b439a0dff41748be7f2f53827a635e989590b21d2064f18babbfabf50df43fd43983f4353fa2c73da8a8ea16b6e83a604790896d8
-
SSDEEP
6144:WIcDMBDMpPCrJTJtyB2Q1Ws5CPpT4ea6F:2DMBgp6r5K8A
Static task
static1
Behavioral task
behavioral1
Sample
61104e2ae6c12556124680a067a454628e71a9e33e2958088c4e392541099e9f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
61104e2ae6c12556124680a067a454628e71a9e33e2958088c4e392541099e9f.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
http://185.172.128.26
-
url_path
/f993692117a3fda2.php
Targets
-
-
Target
61104e2ae6c12556124680a067a454628e71a9e33e2958088c4e392541099e9f
-
Size
252KB
-
MD5
3fb912db2845b9f2c25a405056ada1f5
-
SHA1
de83fd3c4422b4432768073c9cd9faf4662b308e
-
SHA256
61104e2ae6c12556124680a067a454628e71a9e33e2958088c4e392541099e9f
-
SHA512
a595553be3b7f4f03a094e4b439a0dff41748be7f2f53827a635e989590b21d2064f18babbfabf50df43fd43983f4353fa2c73da8a8ea16b6e83a604790896d8
-
SSDEEP
6144:WIcDMBDMpPCrJTJtyB2Q1Ws5CPpT4ea6F:2DMBgp6r5K8A
-
Detect binaries embedding considerable number of MFA browser extension IDs.
-
Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.
-
Detects binaries (Windows and macOS) referencing many web browsers. Observed in information stealers.
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-