General
-
Target
v9bypasserrhahahahahahhahahahaha.exe
-
Size
1.6MB
-
Sample
240903-1g5b4syfqd
-
MD5
bdf653e06b0272d9ef149a5fc96a3899
-
SHA1
9dd63b26b9b5514eda2d19a69b941b19288c0037
-
SHA256
bba38d6d2ef59a107ebe6c7e169f528e21e91173fd66c88e2da0c41adc17d458
-
SHA512
ae88cbcba3616ea08bd95a15f169fdc9df4039042e7bdb283532ce3a3cd60cffc07fd4ddf6f9efb96ff0a90397dc652153d1947c4d0e38b87645589752a60036
-
SSDEEP
49152:vkTq24GjdGSiqkqXfd+/9AqYanieKdsJWh/:v1EjdGSiqkqXf0FLYWuh/
Behavioral task
behavioral1
Sample
v9bypasserrhahahahahahhahahahaha.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
v9bypasserrhahahahahahhahahahaha.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1192226087619530762/53Op2zIMnQilYQKG2ZpjhslqMgCAhjcLyQLQBwa1MQHsZ__WrYEMHcRwHmvGAksWqmnA
Targets
-
-
Target
v9bypasserrhahahahahahhahahahaha.exe
-
Size
1.6MB
-
MD5
bdf653e06b0272d9ef149a5fc96a3899
-
SHA1
9dd63b26b9b5514eda2d19a69b941b19288c0037
-
SHA256
bba38d6d2ef59a107ebe6c7e169f528e21e91173fd66c88e2da0c41adc17d458
-
SHA512
ae88cbcba3616ea08bd95a15f169fdc9df4039042e7bdb283532ce3a3cd60cffc07fd4ddf6f9efb96ff0a90397dc652153d1947c4d0e38b87645589752a60036
-
SSDEEP
49152:vkTq24GjdGSiqkqXfd+/9AqYanieKdsJWh/:v1EjdGSiqkqXf0FLYWuh/
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1