General
-
Target
iZgmWELeW.exe
-
Size
536KB
-
Sample
240504-s1j7aach56
-
MD5
0eb6dbfff80ff1be420351f6a26d622f
-
SHA1
1ca934f59e932387e96a49d88fc05ddf2bf4db8a
-
SHA256
43cdfa89c733035f467ed836d47e9b4f0606694a9f0bbd2e2486f280c3b4bbca
-
SHA512
f03bed046630eaad253d89110cee1711243b377d22f805cdbd28a46e3c2705c987789bb499afb30ad28ce317079a6e6e47ce7064827d58f2f4bbb11d381fe2d0
-
SSDEEP
6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJUZ:OPw2PjCLe3a6Q70zbYow60Z
Behavioral task
behavioral1
Sample
iZgmWELeW.exe
Resource
win10-20240404-en
Malware Config
Extracted
predatorstealer
http://unseamed-semaphore.000webhostapp.com/Panel/index.php
Targets
-
-
Target
iZgmWELeW.exe
-
Size
536KB
-
MD5
0eb6dbfff80ff1be420351f6a26d622f
-
SHA1
1ca934f59e932387e96a49d88fc05ddf2bf4db8a
-
SHA256
43cdfa89c733035f467ed836d47e9b4f0606694a9f0bbd2e2486f280c3b4bbca
-
SHA512
f03bed046630eaad253d89110cee1711243b377d22f805cdbd28a46e3c2705c987789bb499afb30ad28ce317079a6e6e47ce7064827d58f2f4bbb11d381fe2d0
-
SSDEEP
6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJUZ:OPw2PjCLe3a6Q70zbYow60Z
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-