General
-
Target
mediafile.zip
-
Size
2.0MB
-
Sample
240919-rychzstgmk
-
MD5
d239d73b574c49b0087c81d3a4a47c71
-
SHA1
b2af37882a29f745f3e3ec7f0caf528ae4f13360
-
SHA256
c85830fe306de069caee5218dc8c8741b718ee8d9dd1975c91ce67b053db578e
-
SHA512
2ccba109d5ef44318f36c0b2d9674b007541bf2ea469af56246a1ffc7a911d8a31bbfeabfb908505838aa8eb39a9b749d3ded7acd87fd75dc4a06ff4050f0cc5
-
SSDEEP
49152:Cq7BCsx/Auf+HVjVGCTJu2BZaytCa4SuxpOJv:Cq9Fh8V3Ju2BfuOh
Behavioral task
behavioral1
Sample
mediafile.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
mediafile.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealc
meowsterioland13
http://194.36.170.210
-
url_path
/26b01a4cb07d7322.php
Targets
-
-
Target
mediafile.exe
-
Size
3.7MB
-
MD5
be895bd5ac158111518ec50d41fcb871
-
SHA1
25bf30d6d13f93c762b6f341bc629c29d9722326
-
SHA256
1bcc15d694501be5846d278419ca76e86904fb83c0e2337a8fb18627a32204b4
-
SHA512
fc65be37f401b7f373a502e340a42fd07db22d16583de906067c73a04398b8d99ffdc8d427024168c34fca3da93c71273c9b3b46eab383f9e8ed809d59711716
-
SSDEEP
98304:wOCG4h7FiRe7WkAbJ0rCmIZDfNJBechU/dUq:3o7vWkwnmIZDfNJBegc
-
Detects HijackLoader (aka IDAT Loader)
-
Credentials from Password Stores: Credentials from Web Browsers
Malicious Access or copy of Web Browser Credential store.
-
Downloads MZ/PE file
-
Deletes itself
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-