General
-
Target
net8.0windows.rar
-
Size
69KB
-
Sample
241001-jwypfayern
-
MD5
f5c0cace207517b9cb2d92a1f6a2fa9c
-
SHA1
262b21de4b8a0b1c34269e65cba66215520d4983
-
SHA256
2aba1393ad9d161d34c473e633196be971ac8d13a988fb4206568d739a8b5cfb
-
SHA512
e53b510ac48352eb437943b0cbafd5de3f2ca22afc5d58d54af0a639d1d927a71fe3d5b6f65b476536d9f66a2639bd1ebaf482b07ab6d796d6df4c5d31a4243c
-
SSDEEP
1536:ZUHUX4uLyZy2Jd9PEBiKx2qfE65xSXZrfjzgjepCrdQeGm:0Uou32rFEBiK8qsU0XFd+Gm
Static task
static1
Behavioral task
behavioral1
Sample
RLTool.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RLTool.exe
Resource
win10v2004-20240910-en
Behavioral task
behavioral3
Sample
RLTool.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
RLTool.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
stealerium
7960275769:AAFsNj7Q9GrsBKzVEmN2fGOLvIQWelRdwOA
Targets
-
-
Target
RLTool.dll
-
Size
13KB
-
MD5
f05d4fc886f3a83be6f076941f8fa669
-
SHA1
f2679402f45ebb3d6dc79ee204061d71eb6ba4ee
-
SHA256
e574a9a0a146fb842332f480d7104824d4e52525d91a9c0e3225f817ea4e6ef8
-
SHA512
19784eae098912158998fc8806a844497ed47afbe19a9f1a72021d26b0ca316eec33aa7faf202dafc9d5c06ce567bc10382fd907ed6f047ea8688cfdc3d32d86
-
SSDEEP
384:ydm/klk7qv55LvQKrPhrIDfonEFrFx3X:AvtwWE3xH
Score1/10 -
-
-
Target
RLTool.exe
-
Size
135KB
-
MD5
d8dd178edd900a25706432da4168433c
-
SHA1
6f97a417179ddcec0a90eeee4dffd76aa2602537
-
SHA256
1e2b6bfb5d47fef87162614b2c6e5cecd46ce78a1d5cf7ea1744bc49dde8db5f
-
SHA512
6f4b1e2c6c35136899f552c127d992ba30d505ba20f0d5da73801d43d1b1c0a7eb4029a544f5f5eb46a350c7555d4e6c6be6c55db33c4c6a7363f827b68857d8
-
SSDEEP
3072:DjK4UGDHXrQ8hy7qgpHulWD9ZvZ5Pf3Ca10xuZ04ntfO6hBut:DjK4TDUqgpqWDLZ5H+xuZ04FhA
-
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Disables cmd.exe use via registry modification
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Sets desktop wallpaper using registry
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1