General
-
Target
b3b2b2e174b084a99e657ffc6d0a018a.exe
-
Size
1.5MB
-
Sample
240627-r2egraybpp
-
MD5
b3b2b2e174b084a99e657ffc6d0a018a
-
SHA1
f1ade656333311836661eadc284f014bde097dc3
-
SHA256
c5306ed9fda803fbf4fa458b53ccf55be31d944d87f8947c0eee4d9a32bc914d
-
SHA512
41f8a3ed6273c7270ee194bc38805ec3cba559f2c6f9c03ac210bd24aa70bd5ed00afbdabf2301cd259e1c889ff63bcc734cdfd799f52235b57000e3e2349632
-
SSDEEP
24576:IXc46Crf8fAhacHps+/qASfmBgXk/xrADOv1xvF87hso8bTTXo:IXl8IhHHO+SASagXkJr4MDkhs9g
Static task
static1
Behavioral task
behavioral1
Sample
b3b2b2e174b084a99e657ffc6d0a018a.exe
Resource
win7-20240508-en
Malware Config
Extracted
stealc
default
http://68.183.108.129
-
url_path
/6259fdc16222e061.php
Targets
-
-
Target
b3b2b2e174b084a99e657ffc6d0a018a.exe
-
Size
1.5MB
-
MD5
b3b2b2e174b084a99e657ffc6d0a018a
-
SHA1
f1ade656333311836661eadc284f014bde097dc3
-
SHA256
c5306ed9fda803fbf4fa458b53ccf55be31d944d87f8947c0eee4d9a32bc914d
-
SHA512
41f8a3ed6273c7270ee194bc38805ec3cba559f2c6f9c03ac210bd24aa70bd5ed00afbdabf2301cd259e1c889ff63bcc734cdfd799f52235b57000e3e2349632
-
SSDEEP
24576:IXc46Crf8fAhacHps+/qASfmBgXk/xrADOv1xvF87hso8bTTXo:IXl8IhHHO+SASagXkJr4MDkhs9g
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-