Analysis
-
max time kernel
359s -
max time network
360s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 07:24
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Stealerium.zip
Resource
win7-20240903-en
windows7-x64
3 signatures
600 seconds
Behavioral task
behavioral2
Sample
Stealerium.zip
Resource
win10v2004-20241007-en
windows10-2004-x64
37 signatures
600 seconds
General
-
Target
Stealerium.zip
-
Size
5.9MB
-
MD5
e2e609d8870d6257945230e08ca4f62f
-
SHA1
338f787fc2eb8d8a33b7fd0e73f247743c497b9d
-
SHA256
848d8ab365cfa9c087c80b87538a2c86921a16e886f0b3d32405cbe69f4d7f53
-
SHA512
d10daa0212337d10b7ede25e1238dc5f77e93a0b9eb048a4a80c4bd1dc42af2dfdf7e0e8951486db6f738980e4a13802243a3c60696007104ef28f7f58002183
-
SSDEEP
98304:nR9fzGqzRjbT+yYTNWdDAkJNam4FFYGzYqLeB50CcOq0C2xJ9K8YR0fXgnGagsmx:PfzG6jbT+FUiWNaDFFYGEqLeBqCcR0oi
Score
1/10
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3020 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeRestorePrivilege 3020 7zFM.exe Token: 35 3020 7zFM.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3020 7zFM.exe