General
-
Target
253MzWzDFZpiHVY2S4PKfM-1200-80.jpg
-
Size
142KB
-
Sample
240602-kzyz2shd58
-
MD5
4883cfb1d590ba853c55b43630ef8f0b
-
SHA1
836b45a3b18e05755f259fe476301aa9e71c9684
-
SHA256
d53b61c198eca2409f7f8f731e8d0e1a09e084a9a4a889c617c7ea7718d153b8
-
SHA512
d7513c248d9ebb8f7bf4870cb6a679b9e9d68af61e044cd5d85147eba9ec91d4f776ef00c7f259009bc4eb5cf006b46f8a56171561b21dccda879680db078c5c
-
SSDEEP
3072:mLumzujtsrso0xtuSpB42hCpZwtbAUYhiiv0Xuum3s:mimatsrso0xtZpB4JpGtbSsicXuXs
Static task
static1
Behavioral task
behavioral1
Sample
253MzWzDFZpiHVY2S4PKfM-1200-80.jpg
Resource
win11-20240426-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1246744609506201672/hf0mn5sfqMQPf6SMyKIYJ8eZeUJB29FUHxPVgoINxglDNVOq7piJX5Um26b_zeWmSzu8
Targets
-
-
Target
253MzWzDFZpiHVY2S4PKfM-1200-80.jpg
-
Size
142KB
-
MD5
4883cfb1d590ba853c55b43630ef8f0b
-
SHA1
836b45a3b18e05755f259fe476301aa9e71c9684
-
SHA256
d53b61c198eca2409f7f8f731e8d0e1a09e084a9a4a889c617c7ea7718d153b8
-
SHA512
d7513c248d9ebb8f7bf4870cb6a679b9e9d68af61e044cd5d85147eba9ec91d4f776ef00c7f259009bc4eb5cf006b46f8a56171561b21dccda879680db078c5c
-
SSDEEP
3072:mLumzujtsrso0xtuSpB42hCpZwtbAUYhiiv0Xuum3s:mimatsrso0xtZpB4JpGtbSsicXuXs
Score10/10-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-