General
-
Target
build.exe
-
Size
1.6MB
-
Sample
240919-jwh9raybmd
-
MD5
a5b27249ecbe247acfc5cf83273d8665
-
SHA1
95750f6e9ad5575a8ecdfa166360803bae106dea
-
SHA256
16cfc79d7df881059cd59a5bc0fe4211e55a49105eca41810c0fb2a81f1b5fac
-
SHA512
0d09d902ea81803b215fd48851fab45e73742468a445699bcb3f167b5a5f624aa15e16e06f30fcbb982f097f234a03794ad90a997895a7ad2204eead2ce93ea0
-
SSDEEP
24576:Ci2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywW0n:1Tq24GjdGSiJxkqXfd+/9AqYanCLW
Behavioral task
behavioral1
Sample
build.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
build.exe
Resource
win10v2004-20240910-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1286214415032647690/r-yxbuBi8jgUxjR-tve-DhICa88aywPqPL-phwwQiPH4eUFD5sQGev1sHX8VCx21j5r_
Targets
-
-
Target
build.exe
-
Size
1.6MB
-
MD5
a5b27249ecbe247acfc5cf83273d8665
-
SHA1
95750f6e9ad5575a8ecdfa166360803bae106dea
-
SHA256
16cfc79d7df881059cd59a5bc0fe4211e55a49105eca41810c0fb2a81f1b5fac
-
SHA512
0d09d902ea81803b215fd48851fab45e73742468a445699bcb3f167b5a5f624aa15e16e06f30fcbb982f097f234a03794ad90a997895a7ad2204eead2ce93ea0
-
SSDEEP
24576:Ci2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywW0n:1Tq24GjdGSiJxkqXfd+/9AqYanCLW
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1