General
-
Target
a440e88b2c1d1746b82ffaadaef0571a14f3d76dbabba87b0c3de6ac5eff2f35
-
Size
782KB
-
Sample
240425-2cqhtsfh9y
-
MD5
7fabf15848c951f6665ec449c8c77098
-
SHA1
f9ef6114a8e2d3838d0cadd4a71d6baf95e133cf
-
SHA256
a440e88b2c1d1746b82ffaadaef0571a14f3d76dbabba87b0c3de6ac5eff2f35
-
SHA512
4e8b84b13bf04befb12d2f1b2f36a1a7285be640315c1a8eb61137f77ca2202b62892d95fee02debaa75ca3b5d782a5d0a7a08a010206929187504a91e9ddb0a
-
SSDEEP
24576:msP3PswaTgF2US1BHcFZ4wIu3p+3BCku+mzy3EKA+G:mzgFBIjhuZwhu+8EEF9
Static task
static1
Behavioral task
behavioral1
Sample
a440e88b2c1d1746b82ffaadaef0571a14f3d76dbabba87b0c3de6ac5eff2f35.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
http://185.172.128.76
-
url_path
/3cd2b41cbde8fc9c.php
Targets
-
-
Target
a440e88b2c1d1746b82ffaadaef0571a14f3d76dbabba87b0c3de6ac5eff2f35
-
Size
782KB
-
MD5
7fabf15848c951f6665ec449c8c77098
-
SHA1
f9ef6114a8e2d3838d0cadd4a71d6baf95e133cf
-
SHA256
a440e88b2c1d1746b82ffaadaef0571a14f3d76dbabba87b0c3de6ac5eff2f35
-
SHA512
4e8b84b13bf04befb12d2f1b2f36a1a7285be640315c1a8eb61137f77ca2202b62892d95fee02debaa75ca3b5d782a5d0a7a08a010206929187504a91e9ddb0a
-
SSDEEP
24576:msP3PswaTgF2US1BHcFZ4wIu3p+3BCku+mzy3EKA+G:mzgFBIjhuZwhu+8EEF9
-
Glupteba payload
-
Downloads MZ/PE file
-
Modifies Windows Firewall
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1