Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-08-2024 11:27

General

  • Target

    1a0747748452e27793299ed9e363904bab4cc3897160254c7fb4d901ce8d5023.exe

  • Size

    191KB

  • MD5

    435d5310dc3713863ef0b4c4f9d5eeac

  • SHA1

    8feed34f6c03cd883bfce83aee29e411e7261ad5

  • SHA256

    1a0747748452e27793299ed9e363904bab4cc3897160254c7fb4d901ce8d5023

  • SHA512

    579d0e1a7cb3e29493085bb47a37b3e5e7c7dbfad010a9cb9407341cb8cad40a3ec1289311b7be38873f01d08fbf8ba7ed4f1389dd8f5794334040d7ca8aeac6

  • SSDEEP

    3072:6k9c0KFj5qj6o8KaxfE54HnnGqaKl+b2n8OzpPgSFmpKa2:6kO/j5K62aOanGqCbAXPgSFAKa2

Malware Config

Extracted

Family

stealc

Botnet

shell

C2

http://185.196.9.135

Attributes
  • url_path

    /daecd5ae9c3a5474.php

Signatures

  • Stealc

    Stealc is an infostealer written in C++.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\1a0747748452e27793299ed9e363904bab4cc3897160254c7fb4d901ce8d5023.exe
    "C:\Users\Admin\AppData\Local\Temp\1a0747748452e27793299ed9e363904bab4cc3897160254c7fb4d901ce8d5023.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2276-0-0x0000000000B20000-0x0000000000D64000-memory.dmp

    Filesize

    2.3MB

  • memory/2276-1-0x0000000000B20000-0x0000000000D64000-memory.dmp

    Filesize

    2.3MB