General
-
Target
supermain.exe
-
Size
541KB
-
Sample
240915-p84dcavhnm
-
MD5
2f61a2fdad0599146e7546d577d3772d
-
SHA1
281a57e57f2b415c35d5808f890da7e172a1a281
-
SHA256
2ab5dd6218935db97e71e5578ceaa8f87ef7ac30574216662dc6c040136ff5cf
-
SHA512
2830d7d546177138e0f6d2f02a47abe3bfbc05d776ea81780f0f605fe458811c67124e34cb135652f1e6a5a72b62a99640bca8796a3c9fd0360b50b3fe808dc3
-
SSDEEP
12288:GCWMqsBLwNQD8gABE3u5p+hY/4ewg2ZNaKCmWyOfoJVtKtnjWGuWgbHOuSMqT/Yd:XuSOfgAB0
Static task
static1
Behavioral task
behavioral1
Sample
supermain.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
supermain.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
xehook
2.1.5 Stable
https://t.me/+w897k5UK_jIyNDgy
-
id
208
-
token
xehook208939115726271
Targets
-
-
Target
supermain.exe
-
Size
541KB
-
MD5
2f61a2fdad0599146e7546d577d3772d
-
SHA1
281a57e57f2b415c35d5808f890da7e172a1a281
-
SHA256
2ab5dd6218935db97e71e5578ceaa8f87ef7ac30574216662dc6c040136ff5cf
-
SHA512
2830d7d546177138e0f6d2f02a47abe3bfbc05d776ea81780f0f605fe458811c67124e34cb135652f1e6a5a72b62a99640bca8796a3c9fd0360b50b3fe808dc3
-
SSDEEP
12288:GCWMqsBLwNQD8gABE3u5p+hY/4ewg2ZNaKCmWyOfoJVtKtnjWGuWgbHOuSMqT/Yd:XuSOfgAB0
Score10/10-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-