General
-
Target
download
-
Size
456KB
-
Sample
240511-w9rjhaee55
-
MD5
38f54cad3620f8784b5fad06b8af5aec
-
SHA1
99cf7ea0f6456baeee6c69d6f9839e4b4048e432
-
SHA256
32c3fd432328c206b814fbb96ba10d3b214ce37644cf727e9c4c56009893813c
-
SHA512
73b30fd1e6f49315f3e59c2d08cfea2e0e2e3ae449d2f8a19d9ddd9d80bebab243f90294c9368d75aa62b312811ae663132b6a8d51abd3b0811b1a6300843447
-
SSDEEP
3072:C4yQa+N61ZK27lCdc4G2PiXAuMO0uZtHrJ2sKTmn:C4Ra+N61ZK27Oc4G28AuMO0uZ5rJ2yn
Static task
static1
Malware Config
Extracted
stealc
http://89.105.198.116
-
url_path
/192e1934359966f8.php
Targets
-
-
Target
download
-
Size
456KB
-
MD5
38f54cad3620f8784b5fad06b8af5aec
-
SHA1
99cf7ea0f6456baeee6c69d6f9839e4b4048e432
-
SHA256
32c3fd432328c206b814fbb96ba10d3b214ce37644cf727e9c4c56009893813c
-
SHA512
73b30fd1e6f49315f3e59c2d08cfea2e0e2e3ae449d2f8a19d9ddd9d80bebab243f90294c9368d75aa62b312811ae663132b6a8d51abd3b0811b1a6300843447
-
SSDEEP
3072:C4yQa+N61ZK27lCdc4G2PiXAuMO0uZtHrJ2sKTmn:C4Ra+N61ZK27Oc4G28AuMO0uZ5rJ2yn
-
Detects HijackLoader (aka IDAT Loader)
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-