General
-
Target
6a61be101e96b2a7fc073079ece444ed.bin
-
Size
2.4MB
-
Sample
240709-b3s4jazcmn
-
MD5
ec075ebfa9ac4fe0af43fc33948f055e
-
SHA1
bfd789232a886f185e56a6dd8aed378eb501b1e6
-
SHA256
762ced1becc0869204a0d18bff3e297e8b9359cdefb5633169627bade80844da
-
SHA512
f36e74c27f479ee9e452ac5dcadaf74017bec06a3d4a85a363599ca20b65fc9bb37a4820d6cbd7168237c35066bc165195399ad2ae1c2d3cac1ddaa6126fc796
-
SSDEEP
49152:FmcnRRBPQ1VGqxGWSF3vTOVcTaRJSVP9lZ0JZjCVq9gxPqHGG9pQewllrTL:FmsvpK95u3vTgfSx9lZicqg89p2P
Static task
static1
Behavioral task
behavioral1
Sample
e4725ec14fd7c7d20a53e85e49301255caf470080352dab75856cb6c046de37d.exe
Resource
win7-20240708-en
Malware Config
Extracted
stealc
Nice
http://85.28.47.30
-
url_path
/920475a59bac849d.php
Targets
-
-
Target
e4725ec14fd7c7d20a53e85e49301255caf470080352dab75856cb6c046de37d.exe
-
Size
2.4MB
-
MD5
6a61be101e96b2a7fc073079ece444ed
-
SHA1
df5023ce2dd63f71d1b0c6c58643b44438d1c0c5
-
SHA256
e4725ec14fd7c7d20a53e85e49301255caf470080352dab75856cb6c046de37d
-
SHA512
f6ad23b36cbb2251cc4983b50641f0377e318317772d250cb4d4da6cb112c6f969cff9f22603701b027f4a9d5c70b99c01f5bf93300f38d8f4649053375ce767
-
SSDEEP
49152:uVhviOL/5432dIeqI1b5WtMwMSKT7FF8dfGA1Lz7ddgGBfRxXo00:x92ddqMb5WtMNRT7FCgA1t2
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-