Analysis
-
max time kernel
142s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-08-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
Stealer-1.0-all.jar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Stealer-1.0-all.jar
Resource
win10v2004-20240802-en
General
-
Target
Stealer-1.0-all.jar
-
Size
17.6MB
-
MD5
f6fcae66f5b2112ef0b92bef76d53d57
-
SHA1
55ba0529e3206e20bdb506f5ba8786b421afba63
-
SHA256
d4fa640fe3fcd3a3ea766a7b8fbb60bb81b37c3834747f1a0fad8a4b748a7a68
-
SHA512
851b0f5ef50067a40101b74b87c9f6f60dd4fa2cd2c9517ff66505d140c443c25add0b154618395b1b610d8f2cd4957030ebe76077aad735ae3aa1ef2c518367
-
SSDEEP
393216:kb7kU+GwlsPGfwIXzU636e+px0jZNMLjLzewjPlVGNJzl6TNbO/oD:kpbQyP0jZGDKwnGzpUNbDD
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL 2 IoCs
pid Process 3556 java.exe 3556 java.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3556 java.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
114KB
MD5503d6b554ee03ef54c8deb8c440f6012
SHA1e306b2a07bf87e90c63418024c92933bcc3f4d7f
SHA2564c407af4d5326d1ea43e89945eda0b86c81ad0d12bd5465b327c0fd1df56f7d4
SHA5123490b51dfe2e8f6efa3cdeee7bc08c03072597861c1a2f88dc830139abb7611c671ddad345c2af97bb1e88927c09467ed92b5feafe6696d7e2b31b3bd3447437
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
248KB
MD5719d6ba1946c25aa61ce82f90d77ffd5
SHA194d2191378cac5719daecc826fc116816284c406
SHA25669c45175ecfd25af023f96ac0bb2c45e6a95e3ba8a5a50ee7969ccab14825c44
SHA512119152b624948b76921aa91a5024006ef7c8fdbfe5f6fe71b1ec9f2c0e504b22508ff438c4183e60fa8de93eb35a8c7ccdda3a686e3c2f65c8185f1dd2ef248b
-
C:\Users\Admin\AppData\Local\Temp\sqlite-3.42.0.0-e46e23aa-388f-4f3b-bf71-58274d579000-sqlitejdbc.dll
Filesize913KB
MD516d165c26c43d841b5ec73d8e0d6fc9d
SHA12673a2ed3c7e269abf2b3203cc5bcbb52031f93e
SHA256451e319b14cf9b35b99cca2d245e50e97205b7dcabeeccd8fec6bb54c8a2e84c
SHA512694d5261d09a03e1967d41cba5f36a855a0fb9e4684b918ee35d62af9ff671635590f07f1a709de17b7672f2939cdd78f0c0e6c683e90762dbf9e12283c45686