General
-
Target
build.exe
-
Size
1.6MB
-
Sample
240407-ckp5laab2z
-
MD5
da5d7b489f305bc4785c4b802196d586
-
SHA1
7b6eff3abf1ca6d8be14cfebc2e8da8219980b5a
-
SHA256
cb663566640b01aa419b3f2a2382a33b84f016366d0c2f5e00d53dbc58e031a1
-
SHA512
a8d1b0a585e5861927d4e732f189f3c17599aed6ac87588d78bdfb0bc7f80e68b6eb0f2209d7d0aaa4451ca6a49383175361ea8a9e2b185fd0b9faa3297418a4
-
SSDEEP
49152:JkTq24GjdGSiqkqXfd+/9AqYanieKdsa:J1EjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20231215-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1224499889967202324/Ep4cTSbv7Njh7KHwHCcc4B2EBYOxmtRyPgiMLMsVVuUEebCit_eQIaE4HnvzaY0UOi16
Targets
-
-
Target
build.exe
-
Size
1.6MB
-
MD5
da5d7b489f305bc4785c4b802196d586
-
SHA1
7b6eff3abf1ca6d8be14cfebc2e8da8219980b5a
-
SHA256
cb663566640b01aa419b3f2a2382a33b84f016366d0c2f5e00d53dbc58e031a1
-
SHA512
a8d1b0a585e5861927d4e732f189f3c17599aed6ac87588d78bdfb0bc7f80e68b6eb0f2209d7d0aaa4451ca6a49383175361ea8a9e2b185fd0b9faa3297418a4
-
SSDEEP
49152:JkTq24GjdGSiqkqXfd+/9AqYanieKdsa:J1EjdGSiqkqXf0FLYW
Score10/10-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-