General
-
Target
a559e1ce8ec8ec9944c825f6232e2313d77ebb4ff3b264fe43dbc238e1295ebd
-
Size
366KB
-
Sample
240516-jy4cpsbc8s
-
MD5
0e3fe1ab1370765934cddbb1139fb4e1
-
SHA1
4ac0cb6b312719665b64487ec7bb8d6b87a42e6b
-
SHA256
a559e1ce8ec8ec9944c825f6232e2313d77ebb4ff3b264fe43dbc238e1295ebd
-
SHA512
ff68a33436f7d3606e351ef7faf8a0253b014b34fc058f210d3afaa37590b62f079bb728b677ebe8b0c0da034c01682a5098a1f04c26160eb1afac44830aeba4
-
SSDEEP
6144:LT7vKU2KcMeiL0DDzlAy63Ha8ZrGhVVHS8ggReNEOJCongzciV3zW7bfhcK:7vKMheiL0nzlIHa1y5FaoRijOjhcK
Static task
static1
Behavioral task
behavioral1
Sample
a559e1ce8ec8ec9944c825f6232e2313d77ebb4ff3b264fe43dbc238e1295ebd.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
a559e1ce8ec8ec9944c825f6232e2313d77ebb4ff3b264fe43dbc238e1295ebd.exe
Resource
win11-20240419-en
Malware Config
Extracted
stealc
default100
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
a559e1ce8ec8ec9944c825f6232e2313d77ebb4ff3b264fe43dbc238e1295ebd
-
Size
366KB
-
MD5
0e3fe1ab1370765934cddbb1139fb4e1
-
SHA1
4ac0cb6b312719665b64487ec7bb8d6b87a42e6b
-
SHA256
a559e1ce8ec8ec9944c825f6232e2313d77ebb4ff3b264fe43dbc238e1295ebd
-
SHA512
ff68a33436f7d3606e351ef7faf8a0253b014b34fc058f210d3afaa37590b62f079bb728b677ebe8b0c0da034c01682a5098a1f04c26160eb1afac44830aeba4
-
SSDEEP
6144:LT7vKU2KcMeiL0DDzlAy63Ha8ZrGhVVHS8ggReNEOJCongzciV3zW7bfhcK:7vKMheiL0nzlIHa1y5FaoRijOjhcK
Score10/10-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-