General
-
Target
b26c65d6258149bc7790ee5d60c6b7238c8df36c62dacca7342cb5c91510a841
-
Size
231KB
-
Sample
240516-3wq45sfc3x
-
MD5
c8ab0eb4e0011d5a760ef5fd00306e87
-
SHA1
95f68344270a08c38810ecca72aaf7b4e922895b
-
SHA256
b26c65d6258149bc7790ee5d60c6b7238c8df36c62dacca7342cb5c91510a841
-
SHA512
6c65d89bca73dd6971e4990fd3f7ed00214ce504d56c0ceed544d0f7e2b4dd6771eac4bad7812108d016eefe49e95f6a2f1ca738606569e00aafb5a8ed5406cb
-
SSDEEP
3072:s3JG8nwHHBgKpJDf3AUYA8YIA8M1CPAGV/TFW+F+R5WpKSMqj4Oc7vKfboizWn0R:sRwvWoG7WNMMi7bbzW0zPftMTu
Static task
static1
Behavioral task
behavioral1
Sample
b26c65d6258149bc7790ee5d60c6b7238c8df36c62dacca7342cb5c91510a841.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
b26c65d6258149bc7790ee5d60c6b7238c8df36c62dacca7342cb5c91510a841.exe
Resource
win10-20240404-en
Malware Config
Extracted
stealc
default100
http://185.172.128.151
-
url_path
/7043a0c6a68d9c65.php
Targets
-
-
Target
b26c65d6258149bc7790ee5d60c6b7238c8df36c62dacca7342cb5c91510a841
-
Size
231KB
-
MD5
c8ab0eb4e0011d5a760ef5fd00306e87
-
SHA1
95f68344270a08c38810ecca72aaf7b4e922895b
-
SHA256
b26c65d6258149bc7790ee5d60c6b7238c8df36c62dacca7342cb5c91510a841
-
SHA512
6c65d89bca73dd6971e4990fd3f7ed00214ce504d56c0ceed544d0f7e2b4dd6771eac4bad7812108d016eefe49e95f6a2f1ca738606569e00aafb5a8ed5406cb
-
SSDEEP
3072:s3JG8nwHHBgKpJDf3AUYA8YIA8M1CPAGV/TFW+F+R5WpKSMqj4Oc7vKfboizWn0R:sRwvWoG7WNMMi7bbzW0zPftMTu
Score10/10-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-