General
-
Target
updateload.exe
-
Size
3.1MB
-
Sample
240805-gmmvgasekb
-
MD5
4c5dbf388f5de761e45f268186f8be27
-
SHA1
918b198ad13af4c52b4518ff22a2a032e86e3679
-
SHA256
92a218b4b6cbd696cb07698a2da0fc8578ad1f966a88509e25db827fe85a2920
-
SHA512
4f9331107ec172cd3caa767a2af3e9f18e85ccf71b725be4bfbb0e83dcaf40d8e10581531a709227a6135efae8531a9d55bc22b32c0a8eaafdd8adc4c736dc94
-
SSDEEP
49152:DUvC/MTQYNsWy9aRV0NmZfClF/sKkTUD6CsRBJgsoDDeA:IjTQYNsWy6FClFUKkwWRBSpDDeA
Behavioral task
behavioral1
Sample
updateload.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealc
meowsterioland4
http://45.152.112.131
-
url_path
/8ee66a3c8f19e4b5.php
Targets
-
-
Target
updateload.exe
-
Size
3.1MB
-
MD5
4c5dbf388f5de761e45f268186f8be27
-
SHA1
918b198ad13af4c52b4518ff22a2a032e86e3679
-
SHA256
92a218b4b6cbd696cb07698a2da0fc8578ad1f966a88509e25db827fe85a2920
-
SHA512
4f9331107ec172cd3caa767a2af3e9f18e85ccf71b725be4bfbb0e83dcaf40d8e10581531a709227a6135efae8531a9d55bc22b32c0a8eaafdd8adc4c736dc94
-
SSDEEP
49152:DUvC/MTQYNsWy9aRV0NmZfClF/sKkTUD6CsRBJgsoDDeA:IjTQYNsWy6FClFUKkwWRBSpDDeA
-
Detects HijackLoader (aka IDAT Loader)
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-