General
-
Target
Stealerium.zip
-
Size
5.9MB
-
Sample
250109-h8ftqasrd1
-
MD5
e2e609d8870d6257945230e08ca4f62f
-
SHA1
338f787fc2eb8d8a33b7fd0e73f247743c497b9d
-
SHA256
848d8ab365cfa9c087c80b87538a2c86921a16e886f0b3d32405cbe69f4d7f53
-
SHA512
d10daa0212337d10b7ede25e1238dc5f77e93a0b9eb048a4a80c4bd1dc42af2dfdf7e0e8951486db6f738980e4a13802243a3c60696007104ef28f7f58002183
-
SSDEEP
98304:nR9fzGqzRjbT+yYTNWdDAkJNam4FFYGzYqLeB50CcOq0C2xJ9K8YR0fXgnGagsmx:PfzG6jbT+FUiWNaDFFYGEqLeBqCcR0oi
Static task
static1
Behavioral task
behavioral1
Sample
Stealerium.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Stealerium.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
asyncrat
1.0.7
Default
51.89.44.68:8848
etb3t1tr5n
-
delay
1
-
install
true
-
install_file
svchost.exe
-
install_folder
%Temp%
Extracted
gurcu
https://api.telegram.org/bot6589077846:AAGHOGKjUc-Wf835m3GyqXX53Xc8gVmf5yk/getM
https://api.telegram.org/bot6589077846:AAGHOGKjUc-Wf835m3GyqXX53Xc8gVmf5yk/sendMessage?chat_id=6019303946
Targets
-
-
Target
Stealerium.zip
-
Size
5.9MB
-
MD5
e2e609d8870d6257945230e08ca4f62f
-
SHA1
338f787fc2eb8d8a33b7fd0e73f247743c497b9d
-
SHA256
848d8ab365cfa9c087c80b87538a2c86921a16e886f0b3d32405cbe69f4d7f53
-
SHA512
d10daa0212337d10b7ede25e1238dc5f77e93a0b9eb048a4a80c4bd1dc42af2dfdf7e0e8951486db6f738980e4a13802243a3c60696007104ef28f7f58002183
-
SSDEEP
98304:nR9fzGqzRjbT+yYTNWdDAkJNam4FFYGzYqLeB50CcOq0C2xJ9K8YR0fXgnGagsmx:PfzG6jbT+FUiWNaDFFYGEqLeBqCcR0oi
-
Asyncrat family
-
Gurcu family
-
Async RAT payload
-
Downloads MZ/PE file
-
A potential corporate email address has been identified in the URL: =@L
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1