General
-
Target
RUNTIME 127.7.6.1.exe
-
Size
1.6MB
-
Sample
240919-ag4sgazhma
-
MD5
883158f30de1e4d5713ef6c9dfeb4ff4
-
SHA1
d8769685eae9a50b6606b65676c022df8495d809
-
SHA256
936625532ae59fab0c9704750106123d552320710b65a77502f2e5deef86d37b
-
SHA512
8798e22a8787255d1272c2a1e533a9d125228d52500307a6d326bfa6d0b69a67736fbd5d6ca9d510d0ed422894f239561f8ea2762f562e4b52ac7a170bc85219
-
SSDEEP
24576:wi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywf0n:PTq24GjdGSiJxkqXfd+/9AqYanCLf
Behavioral task
behavioral1
Sample
RUNTIME 127.7.6.1.exe
Resource
win11-20240802-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1286112348175597638/xMCQdfzeczl2y00CskX8uE5JTSqPzrQtqfGJnc7Q7S6Apa-49dy35klwwTIiCHyhzkqs
Targets
-
-
Target
RUNTIME 127.7.6.1.exe
-
Size
1.6MB
-
MD5
883158f30de1e4d5713ef6c9dfeb4ff4
-
SHA1
d8769685eae9a50b6606b65676c022df8495d809
-
SHA256
936625532ae59fab0c9704750106123d552320710b65a77502f2e5deef86d37b
-
SHA512
8798e22a8787255d1272c2a1e533a9d125228d52500307a6d326bfa6d0b69a67736fbd5d6ca9d510d0ed422894f239561f8ea2762f562e4b52ac7a170bc85219
-
SSDEEP
24576:wi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywf0n:PTq24GjdGSiJxkqXfd+/9AqYanCLf
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1