General
-
Target
snss1.exe
-
Size
1.0MB
-
Sample
240611-cgf3hs1apj
-
MD5
ffdc69212e6267315ce7fc7c5e8b517c
-
SHA1
d1e6c1a2acf1877439f207d6377987f5a13756e9
-
SHA256
939b4ad64a2fee79a9c587e6ba51da1a91776bc0ba981d6bfdf4ce4e9d38692a
-
SHA512
1a0f2e83397c7bef5e88b0a59321533f33154546594a8710dad8fbd4bccca67969787cdf73f2afb7155cd59742af50dd1bee88ed35eec4f2a2a41d34710dca0d
-
SSDEEP
24576:9e5/rpVXDp3l86eK7m02hxLF6QY4JVz4/bL9rpLJA0vk:MHw1KwJIQYUkjJV+n
Behavioral task
behavioral1
Sample
snss1.exe
Resource
win7-20240220-en
Malware Config
Extracted
stealc
dex9
http://45.132.105.157
-
url_path
/eb155c7506e03ca9.php
Targets
-
-
Target
snss1.exe
-
Size
1.0MB
-
MD5
ffdc69212e6267315ce7fc7c5e8b517c
-
SHA1
d1e6c1a2acf1877439f207d6377987f5a13756e9
-
SHA256
939b4ad64a2fee79a9c587e6ba51da1a91776bc0ba981d6bfdf4ce4e9d38692a
-
SHA512
1a0f2e83397c7bef5e88b0a59321533f33154546594a8710dad8fbd4bccca67969787cdf73f2afb7155cd59742af50dd1bee88ed35eec4f2a2a41d34710dca0d
-
SSDEEP
24576:9e5/rpVXDp3l86eK7m02hxLF6QY4JVz4/bL9rpLJA0vk:MHw1KwJIQYUkjJV+n
-
Detects HijackLoader (aka IDAT Loader)
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-