General
-
Target
build.exe
-
Size
1.6MB
-
Sample
240609-p4pdmabd85
-
MD5
65ac4c33ee36fdbfbe58c2bacde7d8e2
-
SHA1
626de3c64e52f0bbddfb00b2be445f8024779ae4
-
SHA256
3ef7700096a0d04832ba3a91e02feb9f80622b03fbaaa2670dc3ce46ea8d8438
-
SHA512
6064999bdb3df62dd8877e351fdf12deac833b9639034cd30fa649a065914f88b897b1912c5549e4882893705df66e26929bc694b6c3785a590fd4dbfdb32341
-
SSDEEP
49152:EcTq24GjdGSiqkqXfd+/9AqYanieKdY/:E9EjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1249338676173864970/1UCvt4zIgV3_UtULSjJD0UOPY4p2Jm164ODSGLjiMyjN9_MxSoaxoOx4zT2WrQ2UsDiL
Targets
-
-
Target
build.exe
-
Size
1.6MB
-
MD5
65ac4c33ee36fdbfbe58c2bacde7d8e2
-
SHA1
626de3c64e52f0bbddfb00b2be445f8024779ae4
-
SHA256
3ef7700096a0d04832ba3a91e02feb9f80622b03fbaaa2670dc3ce46ea8d8438
-
SHA512
6064999bdb3df62dd8877e351fdf12deac833b9639034cd30fa649a065914f88b897b1912c5549e4882893705df66e26929bc694b6c3785a590fd4dbfdb32341
-
SSDEEP
49152:EcTq24GjdGSiqkqXfd+/9AqYanieKdY/:E9EjdGSiqkqXf0FLYW
Score10/10-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-