General
-
Target
cstealer.exe
-
Size
11.6MB
-
Sample
240419-bt5e7sdg5t
-
MD5
57eef9f9f2951d6396e3b5d55df39f38
-
SHA1
a6a9f3ac132de046615ab4d8bde7f231b5cdfbca
-
SHA256
207f19322bf7c4c646bd36e615760bd5dd0a392f6709be3c5fcba7e5504a161a
-
SHA512
d422c7821a0b16423c3d41d07f2277757378fb43aba44fe83e0f8ec332776e16f7768fe108c559a5c9ef1e54554833986ea4cd8b09cfad3448e4950ef0cf5be7
-
SSDEEP
196608:thlgYEkfbdqBA1HeT39IigwdeE9TFa0Z8DOjCdylUhYMfnSEtT56QOZAzoyKC:NEkfb4q1+TtIiFUY9Z8D8Ccl6lq2TLo6
Malware Config
Targets
-
-
Target
cstealer.exe
-
Size
11.6MB
-
MD5
57eef9f9f2951d6396e3b5d55df39f38
-
SHA1
a6a9f3ac132de046615ab4d8bde7f231b5cdfbca
-
SHA256
207f19322bf7c4c646bd36e615760bd5dd0a392f6709be3c5fcba7e5504a161a
-
SHA512
d422c7821a0b16423c3d41d07f2277757378fb43aba44fe83e0f8ec332776e16f7768fe108c559a5c9ef1e54554833986ea4cd8b09cfad3448e4950ef0cf5be7
-
SSDEEP
196608:thlgYEkfbdqBA1HeT39IigwdeE9TFa0Z8DOjCdylUhYMfnSEtT56QOZAzoyKC:NEkfb4q1+TtIiFUY9Z8D8Ccl6lq2TLo6
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-