General
-
Target
fa854b73b477f55bd2faa482ba8e8fc4.exe
-
Size
1.3MB
-
Sample
240507-zj95psfa3t
-
MD5
fa854b73b477f55bd2faa482ba8e8fc4
-
SHA1
056fb1cdf016ac6d510425ae4dc1693f257dc12e
-
SHA256
905c7a4a098ad5c0fae3b8f15fa5fa56a06372b7441aede1958ae1171e555b2a
-
SHA512
fe1b5c9c6a709b34687e35745bd7662aaff0bf816aedb4f59a68714c4797034e1472c667611eb10fb687916e899613fbb79d692a11cc5e074fce5a2ba1ee54c5
-
SSDEEP
24576:ZtnIMSJmXTYznHLtEqzH+qrjQYgkIuIcDH7IueXN5CUaCWyOVyOckiAhUcMkiAhl:ZtIMvE7rtz7+q/QYgkIu3DHkuedz6rVl
Behavioral task
behavioral1
Sample
fa854b73b477f55bd2faa482ba8e8fc4.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
fa854b73b477f55bd2faa482ba8e8fc4.exe
Resource
win10v2004-20240419-en
Malware Config
Extracted
stealc
http://193.163.7.82
-
url_path
/722c81812703a73d.php
Targets
-
-
Target
fa854b73b477f55bd2faa482ba8e8fc4.exe
-
Size
1.3MB
-
MD5
fa854b73b477f55bd2faa482ba8e8fc4
-
SHA1
056fb1cdf016ac6d510425ae4dc1693f257dc12e
-
SHA256
905c7a4a098ad5c0fae3b8f15fa5fa56a06372b7441aede1958ae1171e555b2a
-
SHA512
fe1b5c9c6a709b34687e35745bd7662aaff0bf816aedb4f59a68714c4797034e1472c667611eb10fb687916e899613fbb79d692a11cc5e074fce5a2ba1ee54c5
-
SSDEEP
24576:ZtnIMSJmXTYznHLtEqzH+qrjQYgkIuIcDH7IueXN5CUaCWyOVyOckiAhUcMkiAhl:ZtIMvE7rtz7+q/QYgkIu3DHkuedz6rVl
Score10/10-
Detects HijackLoader (aka IDAT Loader)
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-