General
-
Target
2temp356.exe
-
Size
7.6MB
-
Sample
240901-1gfnrascrn
-
MD5
4c7fa6d1969c22e6eb4423e61b5362bf
-
SHA1
cb8c74194e13b0c45378f2d6e306c93bf426295f
-
SHA256
9c6d82574506dff981e52381327a153a5a989dfaa74c8a080473575f050395b2
-
SHA512
5c98c3999b7e84a7f0e4fe01ffb116da6dce16fcdce5cec1afeceaaeab67e889858c984af57babc0ececa966c497e05c5b9f4efb2ac6baa337adc8d27d780c45
-
SSDEEP
196608:oJTLQirzOtf8Inwg3TafmeZjYYRvoBZ1XchFky4QdQoFs4FxFbVI:oJTLFzOtf8Inwg3TafmeZjYYRoBZ9cK9
Behavioral task
behavioral1
Sample
2temp356.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
2temp356.exe
Resource
win11-20240802-en
Malware Config
Extracted
stealc
benjiworld29
http://5.188.87.35
-
url_path
/3d7617bd9d626b25.php
Targets
-
-
Target
2temp356.exe
-
Size
7.6MB
-
MD5
4c7fa6d1969c22e6eb4423e61b5362bf
-
SHA1
cb8c74194e13b0c45378f2d6e306c93bf426295f
-
SHA256
9c6d82574506dff981e52381327a153a5a989dfaa74c8a080473575f050395b2
-
SHA512
5c98c3999b7e84a7f0e4fe01ffb116da6dce16fcdce5cec1afeceaaeab67e889858c984af57babc0ececa966c497e05c5b9f4efb2ac6baa337adc8d27d780c45
-
SSDEEP
196608:oJTLQirzOtf8Inwg3TafmeZjYYRvoBZ1XchFky4QdQoFs4FxFbVI:oJTLFzOtf8Inwg3TafmeZjYYRoBZ9cK9
-
Detects HijackLoader (aka IDAT Loader)
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-