General
-
Target
1b192b02fa917ebd5d710a3f9cbf937613ba252be7f3841631a5c729853de509
-
Size
370KB
-
Sample
240717-qrdl2awbqb
-
MD5
e112f7efdda2934f536911329c3cffd6
-
SHA1
06e0e207cb4ba22d8e3438295663fddd93cc22e9
-
SHA256
1b192b02fa917ebd5d710a3f9cbf937613ba252be7f3841631a5c729853de509
-
SHA512
a44fac08544dd6fe3ebcb9692ef85094c12a34795674f47cb095595876a48e479065b7d06de9440e8a5ad10206596722fab82013ab91da4e5350c84572861e2d
-
SSDEEP
6144:U7h79eEroX09/k5chVM7JwBJk6ojYcoqCDGIPgZg0CkYo13SNLfN+TAqne:G7AErJOGg6os2CDGIWd16fu7e
Static task
static1
Behavioral task
behavioral1
Sample
1b192b02fa917ebd5d710a3f9cbf937613ba252be7f3841631a5c729853de509.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
stealc
default
http://85.28.47.101
-
url_path
/f3ee98d7eec07fb9.php
Targets
-
-
Target
1b192b02fa917ebd5d710a3f9cbf937613ba252be7f3841631a5c729853de509
-
Size
370KB
-
MD5
e112f7efdda2934f536911329c3cffd6
-
SHA1
06e0e207cb4ba22d8e3438295663fddd93cc22e9
-
SHA256
1b192b02fa917ebd5d710a3f9cbf937613ba252be7f3841631a5c729853de509
-
SHA512
a44fac08544dd6fe3ebcb9692ef85094c12a34795674f47cb095595876a48e479065b7d06de9440e8a5ad10206596722fab82013ab91da4e5350c84572861e2d
-
SSDEEP
6144:U7h79eEroX09/k5chVM7JwBJk6ojYcoqCDGIPgZg0CkYo13SNLfN+TAqne:G7AErJOGg6os2CDGIWd16fu7e
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-