General
-
Target
StudioStealer.zip
-
Size
21.7MB
-
Sample
240417-r7fa8sec6s
-
MD5
ee7427bbf92ee4f625efcee3f55c6385
-
SHA1
55177b837f531272e5c351380463deb100df88f7
-
SHA256
dad7dd65f13857d4452787e347caeefa7942716dea3fce8d37e7736fbcef0f37
-
SHA512
0323185f91a7ce659a842d9305878ecd68387a70af87a99f3df65a9404182a9a1c0bf677494c8ef1ef845b81ae741b005653284239f9bc93b650e0868d9fd20c
-
SSDEEP
393216:ewkhm7OVU5YGS7skueL5Teh5tcWw/EuNBcr2isU9iWoD3Qcw5dtA/e/f0QGDbJ2D:eRASGKN1Xh+r/xlsYivB4dtA/eX0QGDW
Malware Config
Targets
-
-
Target
StudioStealer.zip
-
Size
21.7MB
-
MD5
ee7427bbf92ee4f625efcee3f55c6385
-
SHA1
55177b837f531272e5c351380463deb100df88f7
-
SHA256
dad7dd65f13857d4452787e347caeefa7942716dea3fce8d37e7736fbcef0f37
-
SHA512
0323185f91a7ce659a842d9305878ecd68387a70af87a99f3df65a9404182a9a1c0bf677494c8ef1ef845b81ae741b005653284239f9bc93b650e0868d9fd20c
-
SSDEEP
393216:ewkhm7OVU5YGS7skueL5Teh5tcWw/EuNBcr2isU9iWoD3Qcw5dtA/e/f0QGDbJ2D:eRASGKN1Xh+r/xlsYivB4dtA/eX0QGDW
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops desktop.ini file(s)
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-