General
-
Target
d22d5aaf005a60e66ef3c3bff3054891.exe
-
Size
1.5MB
-
Sample
240627-redxpsvcjg
-
MD5
d22d5aaf005a60e66ef3c3bff3054891
-
SHA1
0a678dcc5b75e4a711bd703a307cc21378d50add
-
SHA256
ca2874cdb9525d52d0d21315d528bf6cf054b835cdbe96c4b5af103a590ea779
-
SHA512
37b98d11b71f74ebf19cb3e9aefb235670f430e4548da08459c6d71291f8c50d2d49c4c41e813a894abcf2e7a730e9603a2becc97c310973f10f53288fc7702f
-
SSDEEP
24576:IXc46Crf8fA3acHps+/qASfmBgXk/xrADOv1xvF87hso8bTTXo:IXl8I3HHO+SASagXkJr4MDkhs9g
Static task
static1
Behavioral task
behavioral1
Sample
d22d5aaf005a60e66ef3c3bff3054891.exe
Resource
win7-20240221-en
Malware Config
Extracted
stealc
default
http://68.183.108.129
-
url_path
/6259fdc16222e061.php
Targets
-
-
Target
d22d5aaf005a60e66ef3c3bff3054891.exe
-
Size
1.5MB
-
MD5
d22d5aaf005a60e66ef3c3bff3054891
-
SHA1
0a678dcc5b75e4a711bd703a307cc21378d50add
-
SHA256
ca2874cdb9525d52d0d21315d528bf6cf054b835cdbe96c4b5af103a590ea779
-
SHA512
37b98d11b71f74ebf19cb3e9aefb235670f430e4548da08459c6d71291f8c50d2d49c4c41e813a894abcf2e7a730e9603a2becc97c310973f10f53288fc7702f
-
SSDEEP
24576:IXc46Crf8fA3acHps+/qASfmBgXk/xrADOv1xvF87hso8bTTXo:IXl8I3HHO+SASagXkJr4MDkhs9g
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-