General
-
Target
029d4aa2f16cafa871c54f8c9c96da5973e313ef32bf1438e0e6367f5fd32d5d
-
Size
305KB
-
Sample
240521-sx5c2sae8z
-
MD5
7aaba56e05288f2c71b42674a4be4f3b
-
SHA1
0b881c74bca8518057db778eb0c6fcfe64b41d5d
-
SHA256
029d4aa2f16cafa871c54f8c9c96da5973e313ef32bf1438e0e6367f5fd32d5d
-
SHA512
148a2f2e7d241c37777e4d09b04e75bb4999bade4e59fab4799ecbd233ab5e8b070dd590be46849bc4ff81820ba7ccf4304a249161d5e648a9356213bb9acf9f
-
SSDEEP
3072:3c+E3HGr3+hagEUH9C/H8lRYAyuc3jbbeO25g4kBy:3q3H2g/9Z0AZqbbeOD4kB
Static task
static1
Behavioral task
behavioral1
Sample
029d4aa2f16cafa871c54f8c9c96da5973e313ef32bf1438e0e6367f5fd32d5d.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
default11
http://185.172.128.170
-
url_path
/7043a0c6a68d9c65.php
Targets
-
-
Target
029d4aa2f16cafa871c54f8c9c96da5973e313ef32bf1438e0e6367f5fd32d5d
-
Size
305KB
-
MD5
7aaba56e05288f2c71b42674a4be4f3b
-
SHA1
0b881c74bca8518057db778eb0c6fcfe64b41d5d
-
SHA256
029d4aa2f16cafa871c54f8c9c96da5973e313ef32bf1438e0e6367f5fd32d5d
-
SHA512
148a2f2e7d241c37777e4d09b04e75bb4999bade4e59fab4799ecbd233ab5e8b070dd590be46849bc4ff81820ba7ccf4304a249161d5e648a9356213bb9acf9f
-
SSDEEP
3072:3c+E3HGr3+hagEUH9C/H8lRYAyuc3jbbeO25g4kBy:3q3H2g/9Z0AZqbbeOD4kB
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-