General
-
Target
b3bd52ca8703c36661a0c6f4f2de2240d4f4ec2f5360fe195de4c1d4a988e960
-
Size
366KB
-
Sample
240516-jwyz7sbf24
-
MD5
1bfa0637c38006a34e454aef4a9f3f04
-
SHA1
277854bca21c2f8fd1ec6e743ee20343855dc589
-
SHA256
b3bd52ca8703c36661a0c6f4f2de2240d4f4ec2f5360fe195de4c1d4a988e960
-
SHA512
11fb998595c50d5198cea89db37705816756e3d9e56b6ba63048083e0b79677aca8ce8e3f3cc15cb772c4a70ec5d2aff4830ec99a510ebc9cd5f0de7fb1a37c7
-
SSDEEP
6144:LT7vKU2KcMeiL0DDzlAy63Ha8ZrGhVVHS8ggReNEOJCongzciV3zW7bfhcJ:7vKMheiL0nzlIHa1y5FaoRijOjhcJ
Static task
static1
Behavioral task
behavioral1
Sample
b3bd52ca8703c36661a0c6f4f2de2240d4f4ec2f5360fe195de4c1d4a988e960.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral2
Sample
b3bd52ca8703c36661a0c6f4f2de2240d4f4ec2f5360fe195de4c1d4a988e960.exe
Resource
win11-20240508-en
Malware Config
Extracted
stealc
default100
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
b3bd52ca8703c36661a0c6f4f2de2240d4f4ec2f5360fe195de4c1d4a988e960
-
Size
366KB
-
MD5
1bfa0637c38006a34e454aef4a9f3f04
-
SHA1
277854bca21c2f8fd1ec6e743ee20343855dc589
-
SHA256
b3bd52ca8703c36661a0c6f4f2de2240d4f4ec2f5360fe195de4c1d4a988e960
-
SHA512
11fb998595c50d5198cea89db37705816756e3d9e56b6ba63048083e0b79677aca8ce8e3f3cc15cb772c4a70ec5d2aff4830ec99a510ebc9cd5f0de7fb1a37c7
-
SSDEEP
6144:LT7vKU2KcMeiL0DDzlAy63Ha8ZrGhVVHS8ggReNEOJCongzciV3zW7bfhcJ:7vKMheiL0nzlIHa1y5FaoRijOjhcJ
Score10/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-