General
-
Target
SNTvMcyGn.exe
-
Size
536KB
-
Sample
240504-syrhkscg79
-
MD5
c40d5a3491484ba96ea6a1e938e51194
-
SHA1
b20b473e71a20307f7a0fe872cb0b30a50a6ef2f
-
SHA256
958507b834f5546203d355a85c4f867bf1cf9497a61bbd5f35c4baa4887cf8f1
-
SHA512
3cdf811b929895e56b11b68c4bdb7e14c4b4c41132d17e6c1a8a3ead91d535819f556f559a94c160edf6592f233b2d85594e3d4dcf5593d8e3172b6fd78c3413
-
SSDEEP
6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJUS:OPw2PjCLe3a6Q70zbYow60S
Behavioral task
behavioral1
Sample
SNTvMcyGn.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
predatorstealer
http://unseamed-semaphore.000webhostapp.com/Panel/
Targets
-
-
Target
SNTvMcyGn.exe
-
Size
536KB
-
MD5
c40d5a3491484ba96ea6a1e938e51194
-
SHA1
b20b473e71a20307f7a0fe872cb0b30a50a6ef2f
-
SHA256
958507b834f5546203d355a85c4f867bf1cf9497a61bbd5f35c4baa4887cf8f1
-
SHA512
3cdf811b929895e56b11b68c4bdb7e14c4b4c41132d17e6c1a8a3ead91d535819f556f559a94c160edf6592f233b2d85594e3d4dcf5593d8e3172b6fd78c3413
-
SSDEEP
6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJUS:OPw2PjCLe3a6Q70zbYow60S
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-