Analysis
-
max time kernel
44s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2024 19:05
Behavioral task
behavioral1
Sample
3bbdaa00d0153f3dd06c1bfb5901c88129bd6692588b2cf9f7aa80836f547b92.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3bbdaa00d0153f3dd06c1bfb5901c88129bd6692588b2cf9f7aa80836f547b92.exe
Resource
win10v2004-20241007-en
General
-
Target
3bbdaa00d0153f3dd06c1bfb5901c88129bd6692588b2cf9f7aa80836f547b92.exe
-
Size
151KB
-
MD5
6e27a30914405fd496fc312e4a867e30
-
SHA1
72f6b3a73c83b31a22ade0103d53d74d444bcb18
-
SHA256
3bbdaa00d0153f3dd06c1bfb5901c88129bd6692588b2cf9f7aa80836f547b92
-
SHA512
f779229af3cce1ee4dafcad697667170cccb0113f96c884593cc8aa425e115813487cb1ccab49df32ccfe79b8eaf8c290a6be3068a429322e3f75dc3a1620f8c
-
SSDEEP
3072:30z6gqFfzyAy9qngIMZW5qor5H3mqwz+GFj/b1r9TxvcfYxwEKctzk:cifMqm9or5H3mqwz+GFj/b1r9TxvcfYQ
Malware Config
Extracted
xehook
2.1.5 Stable
https://t.me/+w897k5UK_jIyNDgy
-
id
208
-
token
xehook208585951630880
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 21 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2740 3bbdaa00d0153f3dd06c1bfb5901c88129bd6692588b2cf9f7aa80836f547b92.exe