General
-
Target
build.exe
-
Size
1.6MB
-
Sample
240412-mc1w8sce9t
-
MD5
a8703b0ee29269a49021297b1256f797
-
SHA1
8a6d456e428c2f96caa0bd9432aed00ef4be2013
-
SHA256
34b883043f7aee1e8eb1a61528b9afab03503aab78d1e5c3c051c7c63035ffab
-
SHA512
ba2b11bb8e9966eab88cc21783990809f1e04eaddf47d3bf9cb222b31344a95a2693d3358542e5d9385c2a0103f21b8db80a7524a219eac0f90c7c4f7a005c37
-
SSDEEP
49152:JkTq24GjdGSiqkqXfd+/9AqYanieKdse:J1EjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20240226-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1228286833993973813/kf532O_M9fyMqJqfRn55FuBLViT8nuh4aMv1sI5cQDXVhj1iMXNcSRc2XKD_VP2qsDZm
Targets
-
-
Target
build.exe
-
Size
1.6MB
-
MD5
a8703b0ee29269a49021297b1256f797
-
SHA1
8a6d456e428c2f96caa0bd9432aed00ef4be2013
-
SHA256
34b883043f7aee1e8eb1a61528b9afab03503aab78d1e5c3c051c7c63035ffab
-
SHA512
ba2b11bb8e9966eab88cc21783990809f1e04eaddf47d3bf9cb222b31344a95a2693d3358542e5d9385c2a0103f21b8db80a7524a219eac0f90c7c4f7a005c37
-
SSDEEP
49152:JkTq24GjdGSiqkqXfd+/9AqYanieKdse:J1EjdGSiqkqXf0FLYW
Score10/10-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-