General
-
Target
845442d379a4f1edcb78bdbd6a0d270e0a7bbb12d0069023b113919bff402f27
-
Size
1.8MB
-
Sample
240824-y93b4szbpn
-
MD5
aeabd5a19704d016c063b6a7dfe7cef7
-
SHA1
a9d76243c97dd5d5d9dac4a31b739497c4baf4c8
-
SHA256
845442d379a4f1edcb78bdbd6a0d270e0a7bbb12d0069023b113919bff402f27
-
SHA512
54a6a58c69544eb5d3554c2bb5d9831f7e1090d7f9b5b3b3b95726ec15c01e65bdba77da0993ad12ee8f26e1afb22715e6a01f2116bcf54acdb8d081302a5851
-
SSDEEP
49152:/bnwYCRpMTGi593ukfF6ee7zrN1eQr8vELpeiX:DwYMinbgP7y0
Static task
static1
Behavioral task
behavioral1
Sample
845442d379a4f1edcb78bdbd6a0d270e0a7bbb12d0069023b113919bff402f27.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
amadey
4.41
c7817d
http://31.41.244.10
-
install_dir
0e8d0864aa
-
install_file
svoutse.exe
-
strings_key
5481b88a6ef75bcf21333988a4e47048
-
url_paths
/Dem7kTu/index.php
Extracted
stealc
leva
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Targets
-
-
Target
845442d379a4f1edcb78bdbd6a0d270e0a7bbb12d0069023b113919bff402f27
-
Size
1.8MB
-
MD5
aeabd5a19704d016c063b6a7dfe7cef7
-
SHA1
a9d76243c97dd5d5d9dac4a31b739497c4baf4c8
-
SHA256
845442d379a4f1edcb78bdbd6a0d270e0a7bbb12d0069023b113919bff402f27
-
SHA512
54a6a58c69544eb5d3554c2bb5d9831f7e1090d7f9b5b3b3b95726ec15c01e65bdba77da0993ad12ee8f26e1afb22715e6a01f2116bcf54acdb8d081302a5851
-
SSDEEP
49152:/bnwYCRpMTGi593ukfF6ee7zrN1eQr8vELpeiX:DwYMinbgP7y0
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Downloads MZ/PE file
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-