General
-
Target
56078814b6ce3536d4a4040e5dc3840a.exe
-
Size
3.7MB
-
Sample
241110-nqkb3svqbv
-
MD5
56078814b6ce3536d4a4040e5dc3840a
-
SHA1
da7c81230f212e32dfc62de9114a4d0fb1c5930d
-
SHA256
55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852
-
SHA512
e00bce379212438e501e2f027aadddbf8a07fd1b9a18b8cc3b0f8e2323a0010ba0dffee584889d1bfbc13e662b86ffac5911b2c17163abb1531387c36ef56251
-
SSDEEP
98304:A6+OyDN0KCiRrvf7aKpePMcDLEj2Jel4iUf:sOyrrvf7AE23ellm
Behavioral task
behavioral1
Sample
56078814b6ce3536d4a4040e5dc3840a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
56078814b6ce3536d4a4040e5dc3840a.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
stealc
xprivate28
http://83.222.191.225
-
url_path
/31c11d12f15e92b7.php
Targets
-
-
Target
56078814b6ce3536d4a4040e5dc3840a.exe
-
Size
3.7MB
-
MD5
56078814b6ce3536d4a4040e5dc3840a
-
SHA1
da7c81230f212e32dfc62de9114a4d0fb1c5930d
-
SHA256
55747e5ff5b95088ace5e7b529bd1c0190acf8c23bd4c20f215c42b023238852
-
SHA512
e00bce379212438e501e2f027aadddbf8a07fd1b9a18b8cc3b0f8e2323a0010ba0dffee584889d1bfbc13e662b86ffac5911b2c17163abb1531387c36ef56251
-
SSDEEP
98304:A6+OyDN0KCiRrvf7aKpePMcDLEj2Jel4iUf:sOyrrvf7AE23ellm
-
Detects HijackLoader (aka IDAT Loader)
-
Hijackloader family
-
Stealc family
-
Downloads MZ/PE file
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Deletes itself
-
Loads dropped DLL
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2