General
-
Target
#!~#0PEn_9797_P@$SW0rd~!^!!$.zip
-
Size
9.5MB
-
Sample
240619-yj5dsatbrl
-
MD5
1f01ed2412c7fc3c349d082af5cf3f3a
-
SHA1
11be0306121225a81e660a80c21f89d35b38ab96
-
SHA256
72ec695f2865973c87b556096f5d6f75448febac59da7b3dacd6bb6d30a53f28
-
SHA512
d44500ebaa2e324ade340c84ac782cd1a154aa5b05e7c96c32ce977c1164737f2d1b5e2f94168f8d6f210c7abc0aba8229f6f4cc6cd68ecc59b07526d6d7a949
-
SSDEEP
196608:7r4cQBtP4TiXi+E11+U4r0F8ojFjITGzK5eKTBaEvRI+n6size4U5pLXQ57UJm83:7kWeXi+RUNj+eKAE5I+F9pLYMn3
Static task
static1
Behavioral task
behavioral1
Sample
#!~#0PEn_9797_P@$SW0rd~!^!!$/Setup.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
#!~#0PEn_9797_P@$SW0rd~!^!!$/Setup.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
stealc
Extracted
amadey
4.30
ffb1b9
http://proresupdate.com
-
install_dir
4bbb72a446
-
install_file
Hkbsse.exe
-
strings_key
1ebbd218121948a356341fff55521237
-
url_paths
/h9fmdW5/index.php
Targets
-
-
Target
#!~#0PEn_9797_P@$SW0rd~!^!!$/Setup.exe
-
Size
2.3MB
-
MD5
5d52ef45b6e5bf144307a84c2af1581b
-
SHA1
414a899ec327d4a9daa53983544245b209f25142
-
SHA256
26a24d3b0206c6808615c7049859c2fe62c4dcd87e7858be40ae8112b0482616
-
SHA512
458f47c1e4ccf41edaacc57abb663ee77ca098fffc596fad941bbdea67653aeabc79b34d607078b9ee5adb45614e26f5c28a09e8faf9532081fdd5dec9ac3c48
-
SSDEEP
49152:DzO+g39FbI0eQf/Z3CarWedoYAmXviDTMtT2wkqN5K:DzO19Fnf/hdoYAm9ZkqN5K
-
Detect Vidar Stealer
-
XMRig Miner payload
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Suspicious use of SetThreadContext
-