General
-
Target
test.exe
-
Size
1.6MB
-
Sample
240917-sr6nxszhqn
-
MD5
20e93026bee4ab2b660761da15a34902
-
SHA1
2b7c425f6fd0f106bcbcfbe1f978bbd3928bce0a
-
SHA256
e479bae61be6653faa02934e25ee488de09c326b1af8e1458a07b73e54f951ad
-
SHA512
60a96c8df717905d8212e4903fdf24712781bd8dbbff50e4b65a559cbefad9d45dcc6b6f7f8f51c4959a05a928e71d1a5f0e260838db87b5e740c8807ce0db87
-
SSDEEP
24576:ji2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywl0i:GTq24GjdGSiJxkqXfd+/9AqYanCLl
Behavioral task
behavioral1
Sample
test.exe
Resource
win10-20240404-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1285617774177161319/tMrhJuDO8czmq_b-937qRxuTdnQHhiFS_PygTehCI8RAUV1wNRZaDXwScpK7gRF2jWxF
Targets
-
-
Target
test.exe
-
Size
1.6MB
-
MD5
20e93026bee4ab2b660761da15a34902
-
SHA1
2b7c425f6fd0f106bcbcfbe1f978bbd3928bce0a
-
SHA256
e479bae61be6653faa02934e25ee488de09c326b1af8e1458a07b73e54f951ad
-
SHA512
60a96c8df717905d8212e4903fdf24712781bd8dbbff50e4b65a559cbefad9d45dcc6b6f7f8f51c4959a05a928e71d1a5f0e260838db87b5e740c8807ce0db87
-
SSDEEP
24576:ji2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywl0i:GTq24GjdGSiJxkqXfd+/9AqYanCLl
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1