General
-
Target
8155349fcb473636dd3fe097927bb9bb89db87bccb3d10fd03065597fcd73da1
-
Size
342KB
-
Sample
240406-g77elsdc48
-
MD5
a81478f795641d16e8ddf99d1c7f9bcd
-
SHA1
ca7fbab9dcf11232897ed2e00408f74cf6596ca2
-
SHA256
8155349fcb473636dd3fe097927bb9bb89db87bccb3d10fd03065597fcd73da1
-
SHA512
3d908856dc6a8d720369caa3005d227f2b185cf0b34375922df6d36f6026a015396160a3d8dd1afa06a9c66647e308515571bccc6c39149d54573a4af68d4217
-
SSDEEP
6144:TnxvOxqTdkXAyVG2byslJyDPzM9TfBw/Mom9VcurkJbU:TxvOxqxkXAgd0zKTJw/MoY1mU
Static task
static1
Behavioral task
behavioral1
Sample
8155349fcb473636dd3fe097927bb9bb89db87bccb3d10fd03065597fcd73da1.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
default8
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
8155349fcb473636dd3fe097927bb9bb89db87bccb3d10fd03065597fcd73da1
-
Size
342KB
-
MD5
a81478f795641d16e8ddf99d1c7f9bcd
-
SHA1
ca7fbab9dcf11232897ed2e00408f74cf6596ca2
-
SHA256
8155349fcb473636dd3fe097927bb9bb89db87bccb3d10fd03065597fcd73da1
-
SHA512
3d908856dc6a8d720369caa3005d227f2b185cf0b34375922df6d36f6026a015396160a3d8dd1afa06a9c66647e308515571bccc6c39149d54573a4af68d4217
-
SSDEEP
6144:TnxvOxqTdkXAyVG2byslJyDPzM9TfBw/Mom9VcurkJbU:TxvOxqxkXAgd0zKTJw/MoY1mU
-
Stealc family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4