General
-
Target
#^NeW_PcSetUp_6677_PaSṣKḕY#$.zip
-
Size
7.4MB
-
Sample
240619-yr6xksyhnh
-
MD5
e2ca8463b2cc1293bf286f4fb34fb4ec
-
SHA1
d2cf738631b1300ebbbb555959bf35cc0e5d2e37
-
SHA256
1be2dfdf4733f2403d090150a91a260967074db492b4c602c4fe873f45e3f2c5
-
SHA512
49f53cd60abf15c668fe037aa39ebb7b63887aaeb05c2335eeec2fc100bb2136af3fcfba26950b0dae76eb059db97e2ee6eb8677b1055699f775ac3e53767ac9
-
SSDEEP
98304:wXRyCjPd3YHG2gBjiiUvb9qbJ/rBZ0LcV2vrwDaALGbxYDExhY1vWPUdn6tX9flP:2H7Z3RiF5atlCcUsdLuqXpWU6j0//0
Static task
static1
Behavioral task
behavioral1
Sample
#^NeW_PcSetUp_6677_PaS?K?Y#$/Setup.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
#^NeW_PcSetUp_6677_PaS?K?Y#$/Setup.exe
Resource
win10v2004-20240508-en
Malware Config
Extracted
stealc
Extracted
amadey
4.30
ffb1b9
http://proresupdate.com
-
install_dir
4bbb72a446
-
install_file
Hkbsse.exe
-
strings_key
1ebbd218121948a356341fff55521237
-
url_paths
/h9fmdW5/index.php
Targets
-
-
Target
#^NeW_PcSetUp_6677_PaS?K?Y#$/Setup.exe
-
Size
293KB
-
MD5
d9602ab0e6370519bd54d13d22dd6ef5
-
SHA1
95a3a7afdb00e1b2a99fddfe5d3203aa5cd4a09d
-
SHA256
63ec17feda1f0ea80e0dd7b7938fbf7354aedf8d9f4041543afca9a35337f7bf
-
SHA512
4587ca630bf5e421e48d5ac7f9ac6866000b06a99d89c1ca31c999414a63ba06a6be2e11467c045b0e2cddb21d792342e69977e6abda6e265b91044e2c8007cd
-
SSDEEP
6144:jFnHaRGVUA2LOPQNk1Ekle0SnYBV+MiySwq+Q+KxwpwF1oPOmYjeTV4jog:ZnHaRPKIk1Ekle0SQq+Q+OwpwnV4g
-
Detect Vidar Stealer
-
XMRig Miner payload
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-