General
-
Target
9714d301c8b96c7263dea4a36ddbdf74896d31f648d2836fa2d2642dccca17e8.exe
-
Size
493KB
-
Sample
241010-g4pemazcjh
-
MD5
7c6083bf70e2919d0957ffcb7b75ebeb
-
SHA1
89254f92c908c0d99d150649aab4fdea7fc10b34
-
SHA256
9714d301c8b96c7263dea4a36ddbdf74896d31f648d2836fa2d2642dccca17e8
-
SHA512
ba7c4f25f83cfde35252920821707322e3523b3e47bb221239082fce3e3eb6811d302a24c1583bed3d8ddb54a6bb3e99ee6d2c5d3d2f5425ded550b82bcf16e8
-
SSDEEP
12288:PtVE8S9QVK+gLgDWuaQ3HQ0RJaE5hZVQgqt2oRAAn4S:PfS9RkKO3w0RJaOQgq0oRAA4
Static task
static1
Behavioral task
behavioral1
Sample
9714d301c8b96c7263dea4a36ddbdf74896d31f648d2836fa2d2642dccca17e8.exe
Resource
win7-20240708-en
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Targets
-
-
Target
9714d301c8b96c7263dea4a36ddbdf74896d31f648d2836fa2d2642dccca17e8.exe
-
Size
493KB
-
MD5
7c6083bf70e2919d0957ffcb7b75ebeb
-
SHA1
89254f92c908c0d99d150649aab4fdea7fc10b34
-
SHA256
9714d301c8b96c7263dea4a36ddbdf74896d31f648d2836fa2d2642dccca17e8
-
SHA512
ba7c4f25f83cfde35252920821707322e3523b3e47bb221239082fce3e3eb6811d302a24c1583bed3d8ddb54a6bb3e99ee6d2c5d3d2f5425ded550b82bcf16e8
-
SSDEEP
12288:PtVE8S9QVK+gLgDWuaQ3HQ0RJaE5hZVQgqt2oRAAn4S:PfS9RkKO3w0RJaOQgq0oRAA4
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-