General
-
Target
h575dl.bat
-
Size
2.0MB
-
Sample
240707-mbqd4ssamh
-
MD5
1bd27ac94fb231409c9c8b66ff333d49
-
SHA1
ca881eac35c1148ff1ec8605aed78eabf8c917b3
-
SHA256
8021b6d81bbd873fe0c80d3e9d5b07cc2440ece8f7ea48847a34f7206b0adb9e
-
SHA512
c72a971d01655241c985efc2db6a661ad3d847a110d25c3d9cc575cef2b5aac285e7d1bd03a0310a09597a76546bade6e1e85a7c3faa4fda1cb7ba7ec9eab226
-
SSDEEP
24576:Vaf4kqPp9xkcHyay8rnFXZaIKjgXf+abrk7LXg5JnE23eaOAeaT1hACwIsBea+IJ:VawDHxXPaIK8WGALvGdhhDwIs0GJ
Static task
static1
Behavioral task
behavioral1
Sample
h575dl.bat
Resource
win11-20240704-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1259107237951967286/8g_d0Z5LE5pVtDlYqgR3AnCFFmfVpbN1rHQADynMGlBBy3diA91et8k-73GofnP8mI4B
Targets
-
-
Target
h575dl.bat
-
Size
2.0MB
-
MD5
1bd27ac94fb231409c9c8b66ff333d49
-
SHA1
ca881eac35c1148ff1ec8605aed78eabf8c917b3
-
SHA256
8021b6d81bbd873fe0c80d3e9d5b07cc2440ece8f7ea48847a34f7206b0adb9e
-
SHA512
c72a971d01655241c985efc2db6a661ad3d847a110d25c3d9cc575cef2b5aac285e7d1bd03a0310a09597a76546bade6e1e85a7c3faa4fda1cb7ba7ec9eab226
-
SSDEEP
24576:Vaf4kqPp9xkcHyay8rnFXZaIKjgXf+abrk7LXg5JnE23eaOAeaT1hACwIsBea+IJ:VawDHxXPaIK8WGALvGdhhDwIs0GJ
-
Blocklisted process makes network request
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-