General
-
Target
Segwit_Setup.exe
-
Size
47.7MB
-
Sample
240804-l7cmfssgpj
-
MD5
a22d71549d6b60c8c270503f585530ec
-
SHA1
0cb40b824f878a46e7bd55498331f2b87ddd6b25
-
SHA256
7c6543af2eea8ed933e0898bdbcfc642f0c11bece904b366ca939da9e76465eb
-
SHA512
165feee79662d7e37ac9224e6063cea9c37925927aa71065bad9dfb4f44a281cd96fbe243591f1ea731106b5a3031e26f4afc1b164ce8abe9a0d8e4f8af7593a
-
SSDEEP
786432:Iw9nwUuATGdMdG57ASI6ul9TnG2A3sVZqqOssBefetRKssh8BzyQUeaN5M7LZUi7:IAwUu+GdMd+E6ul9Tr0sVZ8x84tzyQUo
Static task
static1
Behavioral task
behavioral1
Sample
Segwit_Setup.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
Segwit_Setup.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealc
doralands2
http://195.211.124.201
-
url_path
/be7c600e19a47f1c.php
Targets
-
-
Target
Segwit_Setup.exe
-
Size
47.7MB
-
MD5
a22d71549d6b60c8c270503f585530ec
-
SHA1
0cb40b824f878a46e7bd55498331f2b87ddd6b25
-
SHA256
7c6543af2eea8ed933e0898bdbcfc642f0c11bece904b366ca939da9e76465eb
-
SHA512
165feee79662d7e37ac9224e6063cea9c37925927aa71065bad9dfb4f44a281cd96fbe243591f1ea731106b5a3031e26f4afc1b164ce8abe9a0d8e4f8af7593a
-
SSDEEP
786432:Iw9nwUuATGdMdG57ASI6ul9TnG2A3sVZqqOssBefetRKssh8BzyQUeaN5M7LZUi7:IAwUu+GdMd+E6ul9Tr0sVZ8x84tzyQUo
-
Detects HijackLoader (aka IDAT Loader)
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Downloads MZ/PE file
-
.NET Reactor proctector
Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2