General
-
Target
806b5f2d3b422d192f787a6eb96d0614c943fafb2c2ea53d4917ad123ddf2551
-
Size
3.8MB
-
Sample
240925-3a1fpawgkb
-
MD5
1c25367e4c2492ebf34728546f96789e
-
SHA1
7ee66552ce8fab8f137e1e67dcd6f79355d78b1e
-
SHA256
806b5f2d3b422d192f787a6eb96d0614c943fafb2c2ea53d4917ad123ddf2551
-
SHA512
7f20b8df12f0bee55eda4d1a8ba00a234ebfb37aff83e7b4ab38186c3947f696f5ccf643d03d9e8103b2880b5f190fb465df4b099d37d6385d66dae81baec945
-
SSDEEP
98304:3PbP5nCK3zBS0g4BchdDh9QWAomJbbbayyxFRPAB:3PbdvB+KkhMxJe/FlAB
Static task
static1
Behavioral task
behavioral1
Sample
806b5f2d3b422d192f787a6eb96d0614c943fafb2c2ea53d4917ad123ddf2551.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
806b5f2d3b422d192f787a6eb96d0614c943fafb2c2ea53d4917ad123ddf2551.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1287529665392807997/bGooHy1iKKCIBP7y-Dpt2JaN2ByNuNEr1f3jVU-J6FjhvK_4shc2bdf_Yp-aH-WmAzbF
Targets
-
-
Target
806b5f2d3b422d192f787a6eb96d0614c943fafb2c2ea53d4917ad123ddf2551
-
Size
3.8MB
-
MD5
1c25367e4c2492ebf34728546f96789e
-
SHA1
7ee66552ce8fab8f137e1e67dcd6f79355d78b1e
-
SHA256
806b5f2d3b422d192f787a6eb96d0614c943fafb2c2ea53d4917ad123ddf2551
-
SHA512
7f20b8df12f0bee55eda4d1a8ba00a234ebfb37aff83e7b4ab38186c3947f696f5ccf643d03d9e8103b2880b5f190fb465df4b099d37d6385d66dae81baec945
-
SSDEEP
98304:3PbP5nCK3zBS0g4BchdDh9QWAomJbbbayyxFRPAB:3PbdvB+KkhMxJe/FlAB
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Legitimate hosting services abused for malware hosting/C2
-