General
-
Target
NZqhGfqWq.exe
-
Size
536KB
-
Sample
240504-szv76ahh4y
-
MD5
bc389e564d09707cc36671f296665afd
-
SHA1
09448c0068106bbf674cae0d7dbb838e469dd896
-
SHA256
07f3462682d325ceac97d83e7f3d678ab56b9d1b74a51ad6ef6ff49767e30c3d
-
SHA512
25ea85dba05ce62fcda6d5621d9ef157c24a4037895513c6ca691e74406e25d1f0f0a57a546a5ba5e8cbee0371cc9f285a7e1c6f91bd6c20e29a9a1b3f58d931
-
SSDEEP
6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJU8:OPw2PjCLe3a6Q70zbYow608
Behavioral task
behavioral1
Sample
NZqhGfqWq.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
predatorstealer
http://unseamed-semaphore.000webhostapp.com/Panel
Targets
-
-
Target
NZqhGfqWq.exe
-
Size
536KB
-
MD5
bc389e564d09707cc36671f296665afd
-
SHA1
09448c0068106bbf674cae0d7dbb838e469dd896
-
SHA256
07f3462682d325ceac97d83e7f3d678ab56b9d1b74a51ad6ef6ff49767e30c3d
-
SHA512
25ea85dba05ce62fcda6d5621d9ef157c24a4037895513c6ca691e74406e25d1f0f0a57a546a5ba5e8cbee0371cc9f285a7e1c6f91bd6c20e29a9a1b3f58d931
-
SSDEEP
6144:X+BWmtpZQYS2PjCLfjSCpkALDUbr0tJ0nzbWdG/Wow7+JJU8:OPw2PjCLe3a6Q70zbYow608
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-