General
-
Target
##!!SetUp_2244_Pa$sW0rd$$!!.zip
-
Size
21.6MB
-
Sample
240618-xwehfsygjp
-
MD5
b6401f6504efddb1b9b45762b5374cb6
-
SHA1
4f71454ce8a9d85996c3ddd59a2bc30d0a7b96bf
-
SHA256
b09d14fbdce91d25ec9e2c680afca3ace960d85324e7639a2aa5eb70bf1ea6d2
-
SHA512
58451d03786a24bc06d3786bef7b9cc8cb9981456615e93756487e6223c5126aaae7ebcee5d5877b4c0e831e4e08113ffe839681e88ef2a6becfb33ee74a98f4
-
SSDEEP
393216:9T9WAoah1Pnc1fPcNjOKeazxTfqYFXn9I4mEKQi8OsOCeyMvI1rBiypJA:9BWAP7c1f5K9xTfZX9I4Pl3LxMvI1tvA
Static task
static1
Behavioral task
behavioral1
Sample
##!!SetUp_2244_Pa$sW0rd$$!!/Setup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
##!!SetUp_2244_Pa$sW0rd$$!!/Setup.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
amadey
4.30
ffb1b9
http://proresupdate.com
-
install_dir
4bbb72a446
-
install_file
Hkbsse.exe
-
strings_key
1ebbd218121948a356341fff55521237
-
url_paths
/h9fmdW5/index.php
Targets
-
-
Target
##!!SetUp_2244_Pa$sW0rd$$!!/Setup.exe
-
Size
718.7MB
-
MD5
206f895f2048b63865a15c88c730df67
-
SHA1
ae225462c8ec8593fd68c3819b9e4e016e7b2a26
-
SHA256
fe780b0e5d8985354906e5d666614c3c6d115e8e164c489a22dcc86edf3e3e31
-
SHA512
25f4cc5af18ffef0bdcf668891052a62e923d04ab063013de2e784152136bc6f1b9fa38742c1cd5f0133dcefb5e250778790df6cc8ff3a08435d2c8f9828860b
-
SSDEEP
393216:iE4pNOK/1nm4QGsfBrqN3TQg+US6fqUsXPf1YZUT:i11nm4QGskTQgPS6f3+FMUT
-
Detect Vidar Stealer
-
XMRig Miner payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-