General
-
Target
build.exe
-
Size
1.6MB
-
Sample
240720-m545cssclg
-
MD5
612ad087f42f881fdd815e7359d8fa95
-
SHA1
f7ccd7954e5883355ee8536956286459a1373258
-
SHA256
b3540264dec0aaf2bad06ad24182e761ea6cb9c1a59ae347b640cd7f740fbfa8
-
SHA512
b194032f90888a24a8319d4c61e1c2a3be0b6b8f45f29468f044d849ca3746a932d0c415885878eb209a6781a3c93149bf26588d72792197f9dc927c3378fdec
-
SSDEEP
49152:DcTq24GjdGSiqkqXfd+/9AqYanieKdY3:D9EjdGSiqkqXf0FLYW
Behavioral task
behavioral1
Sample
build.exe
Resource
win11-20240709-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1264173917312913408/sIUmU0wBMlPx-Tpr7F52rOcamHNMZZ3cududqNK8bZJl40udqFN53SoO-gsDF2P8eKHL
Targets
-
-
Target
build.exe
-
Size
1.6MB
-
MD5
612ad087f42f881fdd815e7359d8fa95
-
SHA1
f7ccd7954e5883355ee8536956286459a1373258
-
SHA256
b3540264dec0aaf2bad06ad24182e761ea6cb9c1a59ae347b640cd7f740fbfa8
-
SHA512
b194032f90888a24a8319d4c61e1c2a3be0b6b8f45f29468f044d849ca3746a932d0c415885878eb209a6781a3c93149bf26588d72792197f9dc927c3378fdec
-
SSDEEP
49152:DcTq24GjdGSiqkqXfd+/9AqYanieKdY3:D9EjdGSiqkqXf0FLYW
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-