General

  • Target

    BTCStealer.zip

  • Size

    1.7MB

  • MD5

    af04b52b51e058402565d868a7bdc04a

  • SHA1

    ed4b1aa3d1388b0d4399642a7e5da6099d46a92e

  • SHA256

    9048b8c979b0362e43294fb4df45eaa87532e432909538e903656ee34f704ad5

  • SHA512

    b61dd1f0f1315fafb126459838ab1e0c06637ab451d7390d80caa5a8f225b465053e4f7b227464a959cb4728516b53faa2a5db0c3ad359e032d1bdeb41ad10ec

  • SSDEEP

    49152:EqC+Kld/Eaf0FvmWzsPdVHpGh77GQtNvIZo:EqC+KX/EafkCdVHYX3tNQy

Score
3/10

Malware Config

Signatures

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • BTCStealer.zip
    .zip
  • BTCStealer/BTCStealer.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • BTCStealer/README.pdf
    .pdf
    • http://t.me/oxamabhattiDonation