General
-
Target
7e6ffdde1226df58092ceeb219ce357f346adf3f97e79b2e91d1f13081899a8a
-
Size
834KB
-
Sample
240723-neebpatelr
-
MD5
e7f7010fceade7fa2798be356fc611b0
-
SHA1
e3c7bdb8c8e03e47d905c1533d4f4640245543ec
-
SHA256
7e6ffdde1226df58092ceeb219ce357f346adf3f97e79b2e91d1f13081899a8a
-
SHA512
da2bcf57c80f51e9ce56fd7db0fc23c84d452d31eaebaa9de4429bfe90af853461241d001314c164fe91ff25911bc2fba0ec00ee0757836faad4f442179e9ffe
-
SSDEEP
24576:FMGArtsJRl3UdGbGKISEK31qMNSOtWsOybMDsZf7:FJJRl3UdGMjMoOtWJybNf7
Static task
static1
Behavioral task
behavioral1
Sample
7e6ffdde1226df58092ceeb219ce357f346adf3f97e79b2e91d1f13081899a8a.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
stealc
default
http://85.28.47.152
-
url_path
/3c829f930578d648.php
Targets
-
-
Target
7e6ffdde1226df58092ceeb219ce357f346adf3f97e79b2e91d1f13081899a8a
-
Size
834KB
-
MD5
e7f7010fceade7fa2798be356fc611b0
-
SHA1
e3c7bdb8c8e03e47d905c1533d4f4640245543ec
-
SHA256
7e6ffdde1226df58092ceeb219ce357f346adf3f97e79b2e91d1f13081899a8a
-
SHA512
da2bcf57c80f51e9ce56fd7db0fc23c84d452d31eaebaa9de4429bfe90af853461241d001314c164fe91ff25911bc2fba0ec00ee0757836faad4f442179e9ffe
-
SSDEEP
24576:FMGArtsJRl3UdGbGKISEK31qMNSOtWsOybMDsZf7:FJJRl3UdGMjMoOtWJybNf7
-
Downloads MZ/PE file
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-