Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-07-2024 08:18

General

  • Target

    60937ed12522a1a7ff0a9e76e66505b900c2e048ca0aac0e10a67e3cf5a993dd.exe

  • Size

    678KB

  • MD5

    880da3fa5fbca3a838cf66e54b11df9c

  • SHA1

    a131b43135247ba6044cab6d6072754deb5ce0ae

  • SHA256

    60937ed12522a1a7ff0a9e76e66505b900c2e048ca0aac0e10a67e3cf5a993dd

  • SHA512

    2e975a6e95b313aada978cdff698db004653abb8d99e385638ed19fde74e8ab025cbc2ef75bfd48d72f88f2b023a4cbb91044a76faf9108f07d81402352513b1

  • SSDEEP

    12288:wgyN2aUBIo7YNQe1F85ZwKd89BcFLasaOWAjRydmKcF+YMeM6/mZtfxnuN4:wgyN2PBJwQ6yEvOesNWAym1+GM6/K5G

Score
10/10

Malware Config

Extracted

Family

stealc

Botnet

default

C2

http://85.28.47.31

Attributes
  • url_path

    /5499d72b3a3e55be.php

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60937ed12522a1a7ff0a9e76e66505b900c2e048ca0aac0e10a67e3cf5a993dd.exe
    "C:\Users\Admin\AppData\Local\Temp\60937ed12522a1a7ff0a9e76e66505b900c2e048ca0aac0e10a67e3cf5a993dd.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3368

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3368-0-0x00000000007B0000-0x0000000000D88000-memory.dmp

    Filesize

    5.8MB

  • memory/3368-3-0x00000000007B0000-0x0000000000D88000-memory.dmp

    Filesize

    5.8MB