Overview
overview
8Static
static
31337 Steam...te.exe
windows7-x64
81337 Steam...te.exe
windows10-2004-x64
81337 Steam...it.dll
windows7-x64
11337 Steam...it.dll
windows10-2004-x64
11337 Steam...ip.dll
windows7-x64
11337 Steam...ip.dll
windows10-2004-x64
11337 Steam...er.exe
windows7-x64
81337 Steam...er.exe
windows10-2004-x64
81337 Steam...it.dll
windows7-x64
11337 Steam...it.dll
windows10-2004-x64
11337 Steam...in.exe
windows7-x64
31337 Steam...in.exe
windows10-2004-x64
81337 Steam...oc.dll
windows10-2004-x64
31337 Steam...oc.dll
windows10-2004-x64
3General
-
Target
1337 SteamACC Stealer Private.rar
-
Size
3.9MB
-
Sample
241123-weydkavqem
-
MD5
043b0d9a764707d551a41fb26b2217a9
-
SHA1
cdb8098ad376f17fd0f084b8be2192598ecd3e86
-
SHA256
77d14133134b278a32839de0ed58091d4a29a5d49daeff04bc0ec0f569553d2e
-
SHA512
3c7bf836e7305bd884e6bac9259d7ebab7571269bf1f88bc2c34b714476ef7f871b5655856a638d3bbf8fb5aa0b323c84d814eae04005f80900e27bca37500f5
-
SSDEEP
98304:cL2KNq4q2iLrgyD1f64k61kTiCybGl403fFhIkJ5pwaNc:cqXksN1kT1yil403fvt5a
Static task
static1
Behavioral task
behavioral1
Sample
1337 SteamACC Stealer Private/1337 SteamACC Stealer Private.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1337 SteamACC Stealer Private/1337 SteamACC Stealer Private.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
1337 SteamACC Stealer Private/Xceed.Wpf.Toolkit.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
1337 SteamACC Stealer Private/Xceed.Wpf.Toolkit.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
1337 SteamACC Stealer Private/data/Ionic.Zip.dll
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
1337 SteamACC Stealer Private/data/Ionic.Zip.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
1337 SteamACC Stealer Private/data/Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
1337 SteamACC Stealer Private/data/Launcher.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
1337 SteamACC Stealer Private/data/Xceed.Wpf.Toolkit.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
1337 SteamACC Stealer Private/data/Xceed.Wpf.Toolkit.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
1337 SteamACC Stealer Private/data/bin.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
1337 SteamACC Stealer Private/data/bin.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
1337 SteamACC Stealer Private/data/secproc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral14
Sample
1337 SteamACC Stealer Private/secproc.dll
Resource
win10v2004-20241007-en
Malware Config
Targets
-
-
Target
1337 SteamACC Stealer Private/1337 SteamACC Stealer Private.exe
-
Size
193KB
-
MD5
d3b6a612e1627ac55ed1036d37c078d2
-
SHA1
86971ed075e24fbcb5590a42432c0610f77a009d
-
SHA256
a5cd5d4e6cebf88a8237da82cd4472ff39270f06ad5759eb0e2ea10e04a4a8b5
-
SHA512
728cf4d1a2e29341aa381673302faf199abb4ee24937eee65e888a7a2adb83ae64626dfecf09b857d0b129b9d2955de86a4c3082422d89830b852f143afb2b75
-
SSDEEP
1536:x4lOeP6M2v9YZQfx+kPmJBtxPeZ3YtlylA9+9POMjHi:x4lOA8hfx+xJBeZ3sylA9+9GWi
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
1337 SteamACC Stealer Private/Xceed.Wpf.Toolkit.dll
-
Size
1.1MB
-
MD5
c3d181ab31e5bec15d266f50c8bfa4d8
-
SHA1
e46b04fe9e1620945881404fcdc73588e84f2dd9
-
SHA256
d78d3c61c4665c703976f5f697187669a5ef888ab1c00ebaabc0bcf409e833ae
-
SHA512
11b0dd0ba7292b5aceceb8f55a388571663f2820c55582e39f7e2727ff4e7ea0e3b51e24ae37c858326f3d1b3ce2ff272703c904dafc11b766ecfbdaaca59572
-
SSDEEP
24576:8N2IhPdiQMKl4fz6eY3vsKQbBlvplvraO3ySG8XxDaZVEbbG6C4:SPdiQMKl4fz6d3vsKIlvplvBfLNaZVEL
Score1/10 -
-
-
Target
1337 SteamACC Stealer Private/data/Ionic.Zip.dll
-
Size
480KB
-
MD5
f6933bf7cee0fd6c80cdf207ff15a523
-
SHA1
039eeb1169e1defe387c7d4ca4021bce9d11786d
-
SHA256
17bb0c9be45289a2be56a5f5a68ec9891d7792b886e0054bc86d57fe84d01c89
-
SHA512
88675512daa41e17ce4daf6ca764ccb17cd9633a7c2b7545875089cae60f6918909a947f3b1692d16ec5fa209e18e84bc0ff3594f72c3e677a6cca9f3a70b8d6
-
SSDEEP
6144:OhagC/Mq25o9sXGtSV41OJDsTDDVUMle6ZjxLV/kHu4Bht79I9:iagxWS4msNUCe65fkHdBf9
Score1/10 -
-
-
Target
1337 SteamACC Stealer Private/data/Launcher.exe
-
Size
53KB
-
MD5
c6d4c881112022eb30725978ecd7c6ec
-
SHA1
ba4f96dc374195d873b3eebdb28b633d9a1c5bf5
-
SHA256
0d87b9b141a592711c52e7409ec64de3ab296cddc890be761d9af57cea381b32
-
SHA512
3bece10b65dfda69b6defbf50d067a59d1cd1db403547fdf28a4cbc87c4985a4636acfcff8300bd77fb91f2693084634d940a91517c33b5425258835ab990981
-
SSDEEP
768:FKtnBTTQi/YqMFlVt52ftDhKeoNzZq8OujxUu5XEAb4b9yvMzUV5:qBTUgYFveDRuFEAb4b99QV5
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
-
-
Target
1337 SteamACC Stealer Private/data/Xceed.Wpf.Toolkit.dll
-
Size
1.1MB
-
MD5
c3d181ab31e5bec15d266f50c8bfa4d8
-
SHA1
e46b04fe9e1620945881404fcdc73588e84f2dd9
-
SHA256
d78d3c61c4665c703976f5f697187669a5ef888ab1c00ebaabc0bcf409e833ae
-
SHA512
11b0dd0ba7292b5aceceb8f55a388571663f2820c55582e39f7e2727ff4e7ea0e3b51e24ae37c858326f3d1b3ce2ff272703c904dafc11b766ecfbdaaca59572
-
SSDEEP
24576:8N2IhPdiQMKl4fz6eY3vsKQbBlvplvraO3ySG8XxDaZVEbbG6C4:SPdiQMKl4fz6d3vsKIlvplvBfLNaZVEL
Score1/10 -
-
-
Target
1337 SteamACC Stealer Private/data/bin.exe
-
Size
2.6MB
-
MD5
e0a4b559ece736a296ac46f718d4f3a2
-
SHA1
b6c3995713b0447d5da26e8fe0be34bac1385a6c
-
SHA256
86d570622651ce8ad89cb880760772ec0da59552042d13e2f78711107d9f0ac2
-
SHA512
5e14b3f43ff4279c1f2f1d36828e997db8b2e9f000662d089d03869771b47fbb91d1fd5628dd513ca2c3f89a21820f29dbf39071f152e8e9683c7b3bc2cea165
-
SSDEEP
49152:P25W4DTnrJlEHeviIi0JO40H5oahF2hqDt2+4qhLvucrBTfRxvHWNVN:e5W4n9lEHQX5HwdhIhqt2+vhLGABDO
Score8/10-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Adds Run key to start application
-
Drops file in System32 directory
-
-
-
Target
1337 SteamACC Stealer Private/data/secproc.dll
-
Size
338KB
-
MD5
c72b72a6f2eb72bc6dd0a2a2164e02e3
-
SHA1
18825cc35e84e960c3c26e23f99fdc80bf346632
-
SHA256
b008544fc732a9c05a1479a2631dbe005e24b69c4abc2922ec7bd87337b76644
-
SHA512
0b73040f80a477b307efa6ca2baa2d8bac7e203b8a23d7e3e5b7daaedc1940778b805e3fbed5c12cf6516f09e243f77a55c404bf2c12b6ee6288f7b2a80f5f98
-
SSDEEP
6144:BPefh6YmnoVPDVYITi3KxtLtOLbWUOGR3JZaYE8z0U3twy/8J:BPefhX1VYITi3KxtQeZGR3dCU3twyk
Score3/10 -
-
-
Target
1337 SteamACC Stealer Private/secproc.dll
-
Size
338KB
-
MD5
c72b72a6f2eb72bc6dd0a2a2164e02e3
-
SHA1
18825cc35e84e960c3c26e23f99fdc80bf346632
-
SHA256
b008544fc732a9c05a1479a2631dbe005e24b69c4abc2922ec7bd87337b76644
-
SHA512
0b73040f80a477b307efa6ca2baa2d8bac7e203b8a23d7e3e5b7daaedc1940778b805e3fbed5c12cf6516f09e243f77a55c404bf2c12b6ee6288f7b2a80f5f98
-
SSDEEP
6144:BPefh6YmnoVPDVYITi3KxtLtOLbWUOGR3JZaYE8z0U3twy/8J:BPefhX1VYITi3KxtQeZGR3dCU3twyk
Score3/10 -