General
-
Target
Temp woofer.rar
-
Size
1.5MB
-
Sample
240917-srdyxazfld
-
MD5
f2c6f31d7186069661900ee36ae3cdbf
-
SHA1
b3d9d42d5950082d0bd0992e08cf95c64ab10d90
-
SHA256
e25d9b3f9951f441e544ec1ff515a7edf660691b3256205c755e3c2aa7a0429a
-
SHA512
5bf65b6cf0301719fecb40ce43e88af2345b962364ae6374edd1ca99153f921081df44e2a2c6c7421b86d4f75777d730db2d7e44d2055ca13b51b6ff5fadd998
-
SSDEEP
24576:EwP97SdoiIec+t5d1AAHCDaAX/7ORii/52ks8eYPARK6tWR2tgLP77HDp2A/3g5P:PwnIec+t5dIeq/KTMks8eVfbE7TDp2SQ
Behavioral task
behavioral1
Sample
Temp woofer/test.exe
Resource
win10-20240404-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1285617774177161319/tMrhJuDO8czmq_b-937qRxuTdnQHhiFS_PygTehCI8RAUV1wNRZaDXwScpK7gRF2jWxF
Targets
-
-
Target
Temp woofer/test.exe
-
Size
1.6MB
-
MD5
20e93026bee4ab2b660761da15a34902
-
SHA1
2b7c425f6fd0f106bcbcfbe1f978bbd3928bce0a
-
SHA256
e479bae61be6653faa02934e25ee488de09c326b1af8e1458a07b73e54f951ad
-
SHA512
60a96c8df717905d8212e4903fdf24712781bd8dbbff50e4b65a559cbefad9d45dcc6b6f7f8f51c4959a05a928e71d1a5f0e260838db87b5e740c8807ce0db87
-
SSDEEP
24576:ji2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywl0i:GTq24GjdGSiJxkqXfd+/9AqYanCLl
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1