Analysis
-
max time kernel
17s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 15:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240705-en
windows7-x64
2 signatures
150 seconds
General
-
Target
file.exe
-
Size
244KB
-
MD5
8e3c2682f9743107cb2b3a3d15b072f5
-
SHA1
660a9b6ad3f5cd1bd37e04015b25a893de4c5f90
-
SHA256
6322686d71a40e20eca9b41af872049e06aab4439a2d06e607e9620decfec41d
-
SHA512
ca5c2366993fe09cc8f15ed6985f6e2f688ce11f1be6ecdc1a6b2dd40b1a1f505781b03236827cf5264aa836d733a59d98560700c8179da4940748d16079b0fe
-
SSDEEP
3072:QcX/GzJvHQn9+skCBqUySy47R2ssdxMXwBF7F8G6gbLYf7H0FF3ad5:X/AJvHQnEayvvf7F8G/3k0vad
Malware Config
Extracted
Family
stealc
Botnet
sila
C2
http://85.28.47.31
Attributes
-
url_path
/5499d72b3a3e55be.php
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe