General
-
Target
dca2faec2933dbe461d5583ba92d89633f4c48bb33c39d9f1f9915a323eccff3
-
Size
216KB
-
Sample
240524-21zfmsee97
-
MD5
eeab6b508f842ce18d229914cd7167f7
-
SHA1
739e0c2cbdc05c27962a4bf5d1388bc31abc8811
-
SHA256
dca2faec2933dbe461d5583ba92d89633f4c48bb33c39d9f1f9915a323eccff3
-
SHA512
465d18d0c28b7579cac4f4b3b67a0cb065df699327401d8edbbf7433083863ff36099ba71d4e9784bdb9ce035209b60b330863de917c05f247f93eefbce4ce74
-
SSDEEP
3072:jMVPYhwPGRcU82DFUT6UX+vkZQ2ftfLmaPUDF2QXrKj1bEVy:IPGdRK2euUXrftjmacDcrj1b
Static task
static1
Behavioral task
behavioral1
Sample
dca2faec2933dbe461d5583ba92d89633f4c48bb33c39d9f1f9915a323eccff3.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
default11
http://185.172.128.170
-
url_path
/7043a0c6a68d9c65.php
Targets
-
-
Target
dca2faec2933dbe461d5583ba92d89633f4c48bb33c39d9f1f9915a323eccff3
-
Size
216KB
-
MD5
eeab6b508f842ce18d229914cd7167f7
-
SHA1
739e0c2cbdc05c27962a4bf5d1388bc31abc8811
-
SHA256
dca2faec2933dbe461d5583ba92d89633f4c48bb33c39d9f1f9915a323eccff3
-
SHA512
465d18d0c28b7579cac4f4b3b67a0cb065df699327401d8edbbf7433083863ff36099ba71d4e9784bdb9ce035209b60b330863de917c05f247f93eefbce4ce74
-
SSDEEP
3072:jMVPYhwPGRcU82DFUT6UX+vkZQ2ftfLmaPUDF2QXrKj1bEVy:IPGdRK2euUXrftjmacDcrj1b
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-