General
-
Target
snss1.zip
-
Size
1.6MB
-
Sample
240806-a4scysxfmh
-
MD5
0cc14b0fba96ba1f45223d3f5b682bdb
-
SHA1
2988280081aa9718c73e6e18a76f3739bbe2629c
-
SHA256
1a2270547fa3f0c903a5eca3318b380be5e5318d748c29b57c1ba657ac66f590
-
SHA512
97f302b211b973e0fef5fb81fe85ba4e55810741489b5980fede73547d373d5c7cb51ac8ffbb563285b90c3c94d16281c215611f1128673c7d9470a594cbac9b
-
SSDEEP
24576:RNFjzbVZsD10uwuj7LlQRjGQXuB6k0uBFzQlpZIsaDqCCbYlDdnUzPOwX:3Jg0AjmZ+okhz8CuWDazPOwX
Behavioral task
behavioral1
Sample
snss1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
snss1.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealc
wasp4
http://45.152.112.103
-
url_path
/1cf3aa1810feeb67.php
Targets
-
-
Target
snss1.exe
-
Size
3.0MB
-
MD5
33b57a0801027e2850d708a8418fab81
-
SHA1
025970a55f120a20c90ca646fe48ac315482b16b
-
SHA256
2126e2d225b9b38190cba5627877bccabc5da5f57443731c8ee292eecec51091
-
SHA512
50a7c77f3e00715b5efb6c6501856849636f428baf1fd50ab48da507685d19f4bfd27350048501833d5a6e5a81e37bea2f4d584c4413ef40b46863057c49ce65
-
SSDEEP
49152:+UvC/MTQYNsWy7aKVN/vndlsKwxEO0YTUD6CsRBJgsoDDeQ:VjTQYNsWy3NndlsdEO0YwWRBSpDDeQ
-
Detects HijackLoader (aka IDAT Loader)
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of SetThreadContext
-