General
-
Target
ddc5593ce74ca4abc5e56238eb8bbbea9e2c8af8de7f334e2ff5198aecef8552
-
Size
270KB
-
Sample
240607-psq33shb34
-
MD5
acb4e9c1d0960dc36b3f892be8c5a7b5
-
SHA1
eb0f1aa120a70bea9d941f1e2d0158929bfc83bd
-
SHA256
ddc5593ce74ca4abc5e56238eb8bbbea9e2c8af8de7f334e2ff5198aecef8552
-
SHA512
cf91a6d526b3ce5714e21aab15c05d5690a727f8eb252c48c5abdb5e0bdd5975ff494c00e9b496b58622f2a228e81c06e41e541085d0bd8b24a7dae5b341d3ae
-
SSDEEP
3072:iLzL3tA7JfAi4J+HAWQHLXLv9MOFK8Iuz2e+S5ArQFaOe5eTll5y:i3L3ytIi4J5XKBuacreITR
Static task
static1
Behavioral task
behavioral1
Sample
ddc5593ce74ca4abc5e56238eb8bbbea9e2c8af8de7f334e2ff5198aecef8552.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
default12
http://185.172.128.170
-
url_path
/7043a0c6a68d9c65.php
Targets
-
-
Target
ddc5593ce74ca4abc5e56238eb8bbbea9e2c8af8de7f334e2ff5198aecef8552
-
Size
270KB
-
MD5
acb4e9c1d0960dc36b3f892be8c5a7b5
-
SHA1
eb0f1aa120a70bea9d941f1e2d0158929bfc83bd
-
SHA256
ddc5593ce74ca4abc5e56238eb8bbbea9e2c8af8de7f334e2ff5198aecef8552
-
SHA512
cf91a6d526b3ce5714e21aab15c05d5690a727f8eb252c48c5abdb5e0bdd5975ff494c00e9b496b58622f2a228e81c06e41e541085d0bd8b24a7dae5b341d3ae
-
SSDEEP
3072:iLzL3tA7JfAi4J+HAWQHLXLv9MOFK8Iuz2e+S5ArQFaOe5eTll5y:i3L3ytIi4J5XKBuacreITR
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-