General
-
Target
files.zip
-
Size
9.3MB
-
Sample
240618-xpe6eavcjc
-
MD5
81b37d006efb1f9fc8c221a5a173049f
-
SHA1
e92f7eab8e95d924f0c52df001d53c445312e201
-
SHA256
6a136a7426b8770d8664cc9e508c093bf597231738e853f21e597dac99534bf3
-
SHA512
8f115e8e38be8077587e3921430f42276ad0b3139472902d0513794f5a24511e2097669007884225f9188c42a8101fb494fe75ac5c65247fd04d5f3207d4407a
-
SSDEEP
196608:gV/X+YkIz22nAyx0EZ52yebghAr0QSK8/ozq4qWD65SD74PyUaBe//P:wmt27/L5errDSKTzIk74q5Yv
Static task
static1
Behavioral task
behavioral1
Sample
files/Setup.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
files/Setup.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
stealc
Extracted
amadey
4.30
ffb1b9
http://proresupdate.com
-
install_dir
4bbb72a446
-
install_file
Hkbsse.exe
-
strings_key
1ebbd218121948a356341fff55521237
-
url_paths
/h9fmdW5/index.php
Targets
-
-
Target
files/Setup.exe
-
Size
5.5MB
-
MD5
9d8649afd4141d960b6545998fbc423b
-
SHA1
3ddd700caaebab0a9d2ed640f235d4b716a505de
-
SHA256
db2457caa1ccd65e63718b9e28789a12e17bc7a038975fba4f07dcd9f38e7016
-
SHA512
0a50681e956df3187a718570fd54600365e8ad805b7e291eb5fc6169df47a6d31596f890419aa36a4f3d983b17eb21eae9e2e51cf5755f8b2b890ba87b752da2
-
SSDEEP
49152:88iGSBp0o5I9vl6yoPgbIXayfQUxldpSphlWopc9MTHKsb48bHVGfKiaaQATZ79z:bihyoPgbInQEHY3N3sNfxLlC1Dxeh
-
Detect Vidar Stealer
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-