General
-
Target
files.zip
-
Size
14.8MB
-
Sample
240618-x2ncjsvdnh
-
MD5
53fa5a7d4d0c2e9a070798baa3f70dac
-
SHA1
a7eb858867e443c051ba4bbe9fcb437a552aea0e
-
SHA256
bb69ef3c30364a122b6bb6a9a35383eb20fc944385ae8cce332b85ae11c32106
-
SHA512
10ead84cc8155cfaa72288916054ebae6c6e8c4c647a9ef7a8a4b49da36aebadff1918883d3cbe69449c871aec88b842c19439fcb095f4f6ced5166ba0ba1448
-
SSDEEP
393216:7dPUs09wbsbAXGhOJlkVPpPQDOfOMLSA/Y8:657boi82BYm9Q8
Static task
static1
Behavioral task
behavioral1
Sample
files/Setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
files/Setup.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
stealc
Extracted
amadey
4.30
ffb1b9
http://proresupdate.com
-
install_dir
4bbb72a446
-
install_file
Hkbsse.exe
-
strings_key
1ebbd218121948a356341fff55521237
-
url_paths
/h9fmdW5/index.php
Targets
-
-
Target
files/Setup.exe
-
Size
316KB
-
MD5
c637e5ecf625b72f4bef9d28cd81d612
-
SHA1
a2c1329d290e508ee9fd0eb81e7f25d57e450f8c
-
SHA256
111c56593668be63e1e0c79a2d33d9e2d49cdf0c5100663c72045bc6b76e9fe6
-
SHA512
727d78bab4fab3674eec92ca5f07df6a0095ab3b973dd227c599c70e8493592bb53bb9208cc6270713283ef0065acfad3203ddcf4dcb6d43f8727f09ceaaf2e4
-
SSDEEP
6144:VzsRSKkhKKXDD2mTLGxelHJ+SBae3VFpSX:6VkhZWEGxelH0SBtfpS
-
Detect Vidar Stealer
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-