General
-
Target
6ae7ac00e318c16fbbd21b44a0df6909b070c44d0c4afd8baea2cbf708fd45e5
-
Size
342KB
-
Sample
240406-ha1fgacf5v
-
MD5
71d6caae505faa6a1beddb92c9b22fd1
-
SHA1
9b6ad03856c4d2b35f8ec5556d6d8c777b24bc2f
-
SHA256
6ae7ac00e318c16fbbd21b44a0df6909b070c44d0c4afd8baea2cbf708fd45e5
-
SHA512
c4c47a14c90c02ad0e57b778bd8db4a7467789b75e2b64771e79d67c3b858fe16b641b9c4264916b6778c8c369f2f11f8a2712636be437bb699503141cbd8d7f
-
SSDEEP
6144:TnxvOxqTdkXAyVG2byslJyDPzM9TfBw/Mom9VcurkJbb:TxvOxqxkXAgd0zKTJw/MoY1mb
Static task
static1
Behavioral task
behavioral1
Sample
6ae7ac00e318c16fbbd21b44a0df6909b070c44d0c4afd8baea2cbf708fd45e5.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealc
default8
http://185.172.128.209
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
6ae7ac00e318c16fbbd21b44a0df6909b070c44d0c4afd8baea2cbf708fd45e5
-
Size
342KB
-
MD5
71d6caae505faa6a1beddb92c9b22fd1
-
SHA1
9b6ad03856c4d2b35f8ec5556d6d8c777b24bc2f
-
SHA256
6ae7ac00e318c16fbbd21b44a0df6909b070c44d0c4afd8baea2cbf708fd45e5
-
SHA512
c4c47a14c90c02ad0e57b778bd8db4a7467789b75e2b64771e79d67c3b858fe16b641b9c4264916b6778c8c369f2f11f8a2712636be437bb699503141cbd8d7f
-
SSDEEP
6144:TnxvOxqTdkXAyVG2byslJyDPzM9TfBw/Mom9VcurkJbb:TxvOxqxkXAgd0zKTJw/MoY1mb
-
Stealc family
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4