General
-
Target
5aa49622f3dafc184f903b7b78a2fd68.exe
-
Size
8.4MB
-
Sample
240507-matedaed84
-
MD5
5aa49622f3dafc184f903b7b78a2fd68
-
SHA1
28fd3345d82da0cdb565a11c648aff196f03d770
-
SHA256
285493c54c35e3b571e28fc0816baa4b3833329eeec3649601dd6385a60c8d84
-
SHA512
fa7c3e619eb64355927fe4fe9ce925abba4c185b85816589a8e3bdf3ca7f0e73bb6c0ca939aa3699b29085f6d694eaf90f2224446156b80839d960a997b64d6d
-
SSDEEP
98304:YajcsQ5SggQZWfV1bihqdq7mXxUHp/nIaWl49u8cSu+A05TeKY7:cs3amByp/IpS9ASu+K
Behavioral task
behavioral1
Sample
5aa49622f3dafc184f903b7b78a2fd68.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
5aa49622f3dafc184f903b7b78a2fd68.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://193.163.7.82
-
url_path
/722c81812703a73d.php
Targets
-
-
Target
5aa49622f3dafc184f903b7b78a2fd68.exe
-
Size
8.4MB
-
MD5
5aa49622f3dafc184f903b7b78a2fd68
-
SHA1
28fd3345d82da0cdb565a11c648aff196f03d770
-
SHA256
285493c54c35e3b571e28fc0816baa4b3833329eeec3649601dd6385a60c8d84
-
SHA512
fa7c3e619eb64355927fe4fe9ce925abba4c185b85816589a8e3bdf3ca7f0e73bb6c0ca939aa3699b29085f6d694eaf90f2224446156b80839d960a997b64d6d
-
SSDEEP
98304:YajcsQ5SggQZWfV1bihqdq7mXxUHp/nIaWl49u8cSu+A05TeKY7:cs3amByp/IpS9ASu+K
Score10/10-
Detects HijackLoader (aka IDAT Loader)
-
Downloads MZ/PE file
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-