General

  • Target

    inv2.rar

  • Size

    998KB

  • MD5

    7278d7ca66978bcaecdb36ac396e933a

  • SHA1

    ca9e4626966312df94e901772513943e2698245a

  • SHA256

    6b5c914e114e50038d60c875ca17291783bddea90a8a3b79dd0d936f2f63a7ea

  • SHA512

    a19a214c429f02427b09e155063ff9bc643ef1c66cde419e33d98aae32fe254261570770078cb7761bbebd0727181c28e06cda9aa5fc8114ee16cee0fc685d2f

  • SSDEEP

    24576:r41Gv8NkGPvzNHtZXDoMa2C1KeYqoh8kKuscli0nLwy:r46wkw1LoMa2C1KeYbRco

Malware Config

Extracted

Family

stealc

Botnet

QQtalk

C2

http://154.216.17.90

Attributes
  • url_path

    /a48146f6763ef3af.php

Extracted

Family

stealc

Botnet

Voov

C2

http://154.216.17.90

Attributes
  • url_path

    /a48146f6763ef3af.php

Signatures

  • DCRat payload 1 IoCs
  • Dcrat family
  • Stealc family
  • Unsigned PE 6 IoCs

    Checks for missing Authenticode signature.

Files

  • inv2.rar
    .rar
  • baedawdgh.exe
    .exe windows:4 windows x86 arch:x86

    0252f8597a857ddcc37d09e38ea5837d


    Headers

    Imports

    Sections

  • gdwadtyjuesfshas.exe
    .exe windows:5 windows x86 arch:x86

    b43a496632b1ed46252f26d650f3ccb2


    Code Sign

    Headers

    Imports

    Sections

  • gweadtrgh.exe
    .exe windows:6 windows x86 arch:x86

    81961373b32efd4098659dcd8637f4f9


    Headers

    Imports

    Sections

  • hjgesadfseawd.exe
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections

  • kisloyat.exe
    .exe windows:5 windows x86 arch:x86

    9688495fa0fb07674109d4238c74f5ee


    Headers

    Imports

    Sections

  • kisteruop.exe
    .exe windows:5 windows x86 arch:x86

    9688495fa0fb07674109d4238c74f5ee


    Headers

    Imports

    Sections

  • pothjmawdtrg.exe
    .exe windows:6 windows x86 arch:x86

    dbd248d6a07e5b5d3562c903534448e7


    Headers

    Imports

    Sections