General
-
Target
f812d7fa7f815e27c65e2e02f577b411ee17c6de45ff6a5e03ab5ce392d4f378
-
Size
2.4MB
-
Sample
240707-hcbvwswcpl
-
MD5
1c537b8dd4f371fc6b114afaa0771263
-
SHA1
65c10b8a838352d2d37f9b1db2a1b79c75c575f1
-
SHA256
f812d7fa7f815e27c65e2e02f577b411ee17c6de45ff6a5e03ab5ce392d4f378
-
SHA512
813afaebce0480432f1c08eec8b62968673f4399989bb25746d96bb8c71ee76685a39719d6a563c62417a65afae0095ae48907f93510ee363baf33e1d1f328f9
-
SSDEEP
49152:x0dAWqiMOC2yB8I/4cloTTUa8M3Piw0R3kt1:x0d1RCf8oi36Lu
Static task
static1
Behavioral task
behavioral1
Sample
8e7963520355e4078e56aa0cbb4b38d6ca934a05ae11005a396ff917991116ff.exe
Resource
win7-20240704-en
Malware Config
Extracted
stealc
Nice
http://85.28.47.30
-
url_path
/920475a59bac849d.php
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Targets
-
-
Target
8e7963520355e4078e56aa0cbb4b38d6ca934a05ae11005a396ff917991116ff.exe
-
Size
2.4MB
-
MD5
f1a2b148ad9d615395cb7190183e1846
-
SHA1
47ffc06503d9e4762170835c8e26a06dac904536
-
SHA256
8e7963520355e4078e56aa0cbb4b38d6ca934a05ae11005a396ff917991116ff
-
SHA512
0569dbd4f21b3275fc2c347297f1911beacc72eceaf5549adecee234e1d60a1cc49377aa23379118fff666b30f7390ff617f534b72a926f46306428377d7138a
-
SSDEEP
49152:K/1un1KSBYUh4VvpzZbM7YyTQZW4DVY2FPQ9ZPEdo+YjDeVPYaj2fWajOdD8Aj/6:K/Qn1Ka4VpzZo8/g4DMn+o+YjDvjOC6S
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-