Analysis
-
max time kernel
94s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 21:04
Static task
static1
Behavioral task
behavioral1
Sample
xrandom.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
xrandom.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral3
Sample
xrandom.exe
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
xrandom.exe
Resource
win7-20240729-en
General
-
Target
xrandom.exe
-
Size
1.3MB
-
MD5
2893a3033daf4b014031297ff29d157d
-
SHA1
a0abe889fc3b0ae8bfdbd0f4f56bc500f56d839f
-
SHA256
c41b3aeb361912b6e938ace351253dbd79d39ec3a8a8cfabf7e3b498ea1aac39
-
SHA512
2deaab343e02c898f51e9f3748ff26214f02e6427a9f82033ad5bccdcf6fb9f84cd52ef7659e9958d8b7de0b26e0585eb588bea15f7f259477807c80ac9921a1
-
SSDEEP
24576:xjYAY3dLBTYhZtsh9M9Z/MnXfCQNfV6HeyhrIuU/zxvuo3A8azMy8R:xYDNTYhZtW9QZUnXqitAEva8azw
Malware Config
Extracted
stealc
default
http://162.248.227.2
-
url_path
/c978b91b47469f3f.php
Signatures
-
Stealc family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xrandom.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4440 xrandom.exe 4440 xrandom.exe 4440 xrandom.exe