General
-
Target
build.exe
-
Size
1.6MB
-
Sample
240609-nslypaag87
-
MD5
68287615157951b078a63742a891653c
-
SHA1
44164050e67294562ad6e32ed2e633e11f254e5f
-
SHA256
b8eb08a9bda3d2960f0be0e8794965c033d7804dc8a12049d3bde25bfa056e85
-
SHA512
f0618279bcf8579681662bde3ad4d5433c4c50b69d228cb8381becde4a538054588c0d8412d1420fd8894242d7e06362b066ebc33397bc7c5872793b7976cbe9
-
SSDEEP
49152:FPTq24GjdGSiqkqXfd+/9AqYanieKd0v:FeEjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1249320435800346624/jS4JCHSKmn87Alc8i168tTvyKloM4KDU48bBHbid6tnmT9tGZlOOisrv796J0P5WLHGK
Targets
-
-
Target
build.exe
-
Size
1.6MB
-
MD5
68287615157951b078a63742a891653c
-
SHA1
44164050e67294562ad6e32ed2e633e11f254e5f
-
SHA256
b8eb08a9bda3d2960f0be0e8794965c033d7804dc8a12049d3bde25bfa056e85
-
SHA512
f0618279bcf8579681662bde3ad4d5433c4c50b69d228cb8381becde4a538054588c0d8412d1420fd8894242d7e06362b066ebc33397bc7c5872793b7976cbe9
-
SSDEEP
49152:FPTq24GjdGSiqkqXfd+/9AqYanieKd0v:FeEjdGSiqkqXf0FLYW
Score10/10-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-