Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-01-2025 04:09
Behavioral task
behavioral1
Sample
stealer_protect-Copy.exe
Resource
win7-20240903-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
stealer_protect-Copy.exe
Resource
win10v2004-20241007-en
windows10-2004-x64
9 signatures
150 seconds
General
-
Target
stealer_protect-Copy.exe
-
Size
9.1MB
-
MD5
cb86dd3b875f9cbd61325b45e50373a0
-
SHA1
24b293baf601633d98ac46794ce35675011df210
-
SHA256
14e0330250b54a0f15e5db48a53b0bf6517bed4fec8209eb5dc1df49ba9e5b8b
-
SHA512
5019feeb950eb8a8fad4cdb161a43724b2600a5da12b26e1feb1bc4419b6f977b2016b106efcdb99271ff0b0c905a03b5a8c70df7283ec2449186c741b869011
-
SSDEEP
196608:7G0ytxxQdi7nJf77gov4fplpRQSk5ZMGQfPXeLA52ANexrNceFcLQdc6E:7GZCWnN4OSWOvfPFCFF4Q
Malware Config
Extracted
Family
skuld
C2
https://discord.com/api/webhooks/1327282019205386252/erLY2QwL_rt0jlh9ekxiZDsoz9mmhENv17cYsEaE1ETg-IcHrp5uYIg3T1AvvJtwEpMs
Signatures
-
Skuld family
-
resource yara_rule behavioral1/memory/2284-11-0x0000000000C70000-0x0000000002377000-memory.dmp vmprotect -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2284 stealer_protect-Copy.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2284 stealer_protect-Copy.exe