General
-
Target
b94bcdf5d6b9f1eb6abe97090993e8c4f66b514dd9c51193f16673e842253d86
-
Size
6.8MB
-
Sample
240911-tw392a1cpe
-
MD5
acb755d083c876f6a80105c17cc61754
-
SHA1
8ccfc2b30402e76a59ed07873b0ccf589728fd22
-
SHA256
b94bcdf5d6b9f1eb6abe97090993e8c4f66b514dd9c51193f16673e842253d86
-
SHA512
2d26da0b24c61e05a66583b548672f00b4351c87669fb8b7e4e71a73da4a2c0e470d7c6aa8072976fe8ca2ac5ea6b75e41f54b426c0d1de06aa118a83283b70b
-
SSDEEP
196608:DzSpVt4hhiIbZg4T4hac7p6eDcGRY9Dc+/7/MS6a:DWp74hVbehacQeHwDc+/7zb
Behavioral task
behavioral1
Sample
b94bcdf5d6b9f1eb6abe97090993e8c4f66b514dd9c51193f16673e842253d86.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
b94bcdf5d6b9f1eb6abe97090993e8c4f66b514dd9c51193f16673e842253d86.exe
Resource
win11-20240802-en
Malware Config
Extracted
https://www.et-ba.com.tr/temp/b64_akam_kent_2708.ps1
Extracted
https://calbyiris.com/fvz/f2v.zip
https://calbyiris.com/fvz/f1v.zip
https://calbyiris.com/fvz/f3v.zip
https://calbyiris.com/fvz/f4v.zip
https://calbyiris.com/fvf/
Extracted
stealc
Workbaza
http://5.35.36.211
-
url_path
/cadb6378d4b16104.php
Targets
-
-
Target
b94bcdf5d6b9f1eb6abe97090993e8c4f66b514dd9c51193f16673e842253d86
-
Size
6.8MB
-
MD5
acb755d083c876f6a80105c17cc61754
-
SHA1
8ccfc2b30402e76a59ed07873b0ccf589728fd22
-
SHA256
b94bcdf5d6b9f1eb6abe97090993e8c4f66b514dd9c51193f16673e842253d86
-
SHA512
2d26da0b24c61e05a66583b548672f00b4351c87669fb8b7e4e71a73da4a2c0e470d7c6aa8072976fe8ca2ac5ea6b75e41f54b426c0d1de06aa118a83283b70b
-
SSDEEP
196608:DzSpVt4hhiIbZg4T4hac7p6eDcGRY9Dc+/7/MS6a:DWp74hVbehacQeHwDc+/7zb
-
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4