General
-
Target
anti byfron.exe
-
Size
1.6MB
-
Sample
240612-x1wmjawhlc
-
MD5
1650c59699c514d9bede975e8d1dcdb1
-
SHA1
43bb3ab6426fc86a93936f9bdce1be4ed4b8c7a5
-
SHA256
ef84001f2af75ccb675331fbe87fd5d0d815fc15dfe8b121842d35df859ba2e8
-
SHA512
c272382efa29520747d28412d5b9413eec8154b3bc28a7a32221e69e0f8c3d90faa8aaf566f362a0badbd835d38165391c99c76a96209ce6cb4d3ed653814270
-
SSDEEP
49152:3cTq24GjdGSiqkqXfd+/9AqYanieKdYs:39EjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
anti byfron.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
anti byfron.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1250527734837415967/eVJufxQw3esQTs3-rr2F_Jrxo4O3BJb5-pnsB_nV-1tS1R7u065bf4Rt_NbPIWe-MCpi
Targets
-
-
Target
anti byfron.exe
-
Size
1.6MB
-
MD5
1650c59699c514d9bede975e8d1dcdb1
-
SHA1
43bb3ab6426fc86a93936f9bdce1be4ed4b8c7a5
-
SHA256
ef84001f2af75ccb675331fbe87fd5d0d815fc15dfe8b121842d35df859ba2e8
-
SHA512
c272382efa29520747d28412d5b9413eec8154b3bc28a7a32221e69e0f8c3d90faa8aaf566f362a0badbd835d38165391c99c76a96209ce6cb4d3ed653814270
-
SSDEEP
49152:3cTq24GjdGSiqkqXfd+/9AqYanieKdYs:39EjdGSiqkqXf0FLYW
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-