General
-
Target
rat.exe
-
Size
1.6MB
-
Sample
240925-nw2tbawhqd
-
MD5
be830082457d9fc658309f95a07099da
-
SHA1
8fcc5988cb62925e26c5f3567223fff79efa351e
-
SHA256
f06316c624961051e89bfa9d6a2cd647e2749006eb2a867cac1976667055f3b4
-
SHA512
af6d0264d77674fab722e6d0d268027a6053d942acfc9a8f3b94f4230842761411c081c9a78cc9c58865a4bc4d14680e963468db8d9a0ef69846cf4e9b87b430
-
SSDEEP
24576:Yi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywm0n:HTq24GjdGSiJxkqXfd+/9AqYanCLm
Behavioral task
behavioral1
Sample
rat.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
rat.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealerium
https://discord.com/api/webhooks/1288466233993334785/bvXUkJru6bM4LZMznPzmSqzB7BV8e49Q0i4gDuNVtyNDqrIuEAvj0zzmaOdSBD0yMLcb
Targets
-
-
Target
rat.exe
-
Size
1.6MB
-
MD5
be830082457d9fc658309f95a07099da
-
SHA1
8fcc5988cb62925e26c5f3567223fff79efa351e
-
SHA256
f06316c624961051e89bfa9d6a2cd647e2749006eb2a867cac1976667055f3b4
-
SHA512
af6d0264d77674fab722e6d0d268027a6053d942acfc9a8f3b94f4230842761411c081c9a78cc9c58865a4bc4d14680e963468db8d9a0ef69846cf4e9b87b430
-
SSDEEP
24576:Yi2Q9NXw2/wPOjdGxY2rJxkqjVnlqud+/2P+A+ZecdyFoBkkAqmZywm0n:HTq24GjdGSiJxkqXfd+/9AqYanCLm
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1