General
-
Target
build.exe
-
Size
1.6MB
-
Sample
240623-ndwvcayfnc
-
MD5
db5914f236765a885126420ec7d4d482
-
SHA1
1cda1bdebbf011b0a6df91de5eec9677886bfba7
-
SHA256
83af61927a5d04c9827052d62448a85c9d73c109a35fb629da3b8ebc073ebb4e
-
SHA512
c69ca07d29d425774ed7f827753dc107b80bab6bb37c948e987bd461d0b99b075e3d6a77de28cd1e8de730ad9237357082990e8f5537196ae6c2c4aba65be860
-
SSDEEP
49152:ULTq24GjdGSiqkqXfd+/9AqYanieKdQD:UiEjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
build.exe
Resource
win10v2004-20240611-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1254394605395513354/MOH2RBINJ_JTfM-9Ci17VZTWgKrhpBY-KW8unJCya2oVt1lvrsyR9HB0mSsbDBwL9y49
Targets
-
-
Target
build.exe
-
Size
1.6MB
-
MD5
db5914f236765a885126420ec7d4d482
-
SHA1
1cda1bdebbf011b0a6df91de5eec9677886bfba7
-
SHA256
83af61927a5d04c9827052d62448a85c9d73c109a35fb629da3b8ebc073ebb4e
-
SHA512
c69ca07d29d425774ed7f827753dc107b80bab6bb37c948e987bd461d0b99b075e3d6a77de28cd1e8de730ad9237357082990e8f5537196ae6c2c4aba65be860
-
SSDEEP
49152:ULTq24GjdGSiqkqXfd+/9AqYanieKdQD:UiEjdGSiqkqXf0FLYW
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-