General
-
Target
66fbc128c741b0d895e723e7ef1bc7f2a953beda60cbebf55b8f8139926d4849.exe
-
Size
493KB
-
Sample
241010-hn7rpswcmj
-
MD5
9d12c4ebf544f59c5778b070defbe130
-
SHA1
7bd747844eab8ff263b75ace7537c8b7d163e20d
-
SHA256
66fbc128c741b0d895e723e7ef1bc7f2a953beda60cbebf55b8f8139926d4849
-
SHA512
a20b043bbbccde6a8551ecad395d705707afc83516465b5ffaae258e4a22b4782760f1ae59b9612764b47fe339ed0de0b73e302bbc0e25b0f910aee533213997
-
SSDEEP
12288:C/l9sitPVq0+PC7yuotJWyCi3vS9J1LHyh8mr5W5Eeo4S:CsitS4FkJWye9J1sJ5W57p
Static task
static1
Behavioral task
behavioral1
Sample
66fbc128c741b0d895e723e7ef1bc7f2a953beda60cbebf55b8f8139926d4849.exe
Resource
win7-20240903-en
Malware Config
Extracted
stealc
default
http://46.8.231.109
-
url_path
/c4754d4f680ead72.php
Targets
-
-
Target
66fbc128c741b0d895e723e7ef1bc7f2a953beda60cbebf55b8f8139926d4849.exe
-
Size
493KB
-
MD5
9d12c4ebf544f59c5778b070defbe130
-
SHA1
7bd747844eab8ff263b75ace7537c8b7d163e20d
-
SHA256
66fbc128c741b0d895e723e7ef1bc7f2a953beda60cbebf55b8f8139926d4849
-
SHA512
a20b043bbbccde6a8551ecad395d705707afc83516465b5ffaae258e4a22b4782760f1ae59b9612764b47fe339ed0de0b73e302bbc0e25b0f910aee533213997
-
SSDEEP
12288:C/l9sitPVq0+PC7yuotJWyCi3vS9J1LHyh8mr5W5Eeo4S:CsitS4FkJWye9J1sJ5W57p
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-