General
-
Target
567jn7x.exe
-
Size
1.1MB
-
Sample
240721-e1p6msthpf
-
MD5
e8a1d35e54a6982c175c4351f3ce0dcd
-
SHA1
9e5c8167d0957701d549f4586f9b5e9861df5471
-
SHA256
6565ab8e7be0d3e8544a49cb90e79715df0120d03c187ba9443ab738ca4dca28
-
SHA512
6bb5a288d5fd7962e5bc80cb8785ecc67d83be49ec701bb61a88d7d3e0af90a0747d1f015506b07d2661becf98ac76f067cecf261d507b51dcfdbade9f31d78c
-
SSDEEP
24576:Xi+H+khU6fKwnSQM1BQjo0ejcik51r/rwuMGRvot:Xq6fKwnSQM1OrCarzsGRI
Static task
static1
Malware Config
Extracted
stealc
QLL
http://85.28.47.70
-
url_path
/744f169d372be841.php
Targets
-
-
Target
567jn7x.exe
-
Size
1.1MB
-
MD5
e8a1d35e54a6982c175c4351f3ce0dcd
-
SHA1
9e5c8167d0957701d549f4586f9b5e9861df5471
-
SHA256
6565ab8e7be0d3e8544a49cb90e79715df0120d03c187ba9443ab738ca4dca28
-
SHA512
6bb5a288d5fd7962e5bc80cb8785ecc67d83be49ec701bb61a88d7d3e0af90a0747d1f015506b07d2661becf98ac76f067cecf261d507b51dcfdbade9f31d78c
-
SSDEEP
24576:Xi+H+khU6fKwnSQM1BQjo0ejcik51r/rwuMGRvot:Xq6fKwnSQM1OrCarzsGRI
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-