General
-
Target
3c781ad13c32a5d187e983671268fe8f8fc7268434c20a1f30e9e6effa307557
-
Size
249KB
-
Sample
240531-x73pesae6v
-
MD5
db5c28a484a44eb2a8079d4023b3126b
-
SHA1
4e234f3864f999c7d6cd5f54e49e0b17faf94352
-
SHA256
3c781ad13c32a5d187e983671268fe8f8fc7268434c20a1f30e9e6effa307557
-
SHA512
895f2284419e6acf4b7ee77f843960ff49c16e74b170acb418927157d1923a1ac3c08909030a34ada8a02114b46f0df20e5bf33f7312cfde68ce7a8b11b828ad
-
SSDEEP
3072:JXuLhLJcLQY4oimbQTxjs8/kgPj1v/xy6dm55pN/1/h/IYE:0h+goT88M1vJOJE
Static task
static1
Behavioral task
behavioral1
Sample
3c781ad13c32a5d187e983671268fe8f8fc7268434c20a1f30e9e6effa307557.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
default12
http://185.172.128.170
-
url_path
/7043a0c6a68d9c65.php
Targets
-
-
Target
3c781ad13c32a5d187e983671268fe8f8fc7268434c20a1f30e9e6effa307557
-
Size
249KB
-
MD5
db5c28a484a44eb2a8079d4023b3126b
-
SHA1
4e234f3864f999c7d6cd5f54e49e0b17faf94352
-
SHA256
3c781ad13c32a5d187e983671268fe8f8fc7268434c20a1f30e9e6effa307557
-
SHA512
895f2284419e6acf4b7ee77f843960ff49c16e74b170acb418927157d1923a1ac3c08909030a34ada8a02114b46f0df20e5bf33f7312cfde68ce7a8b11b828ad
-
SSDEEP
3072:JXuLhLJcLQY4oimbQTxjs8/kgPj1v/xy6dm55pN/1/h/IYE:0h+goT88M1vJOJE
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-