General
-
Target
Silent XMR Miner Builder.exe
-
Size
44.7MB
-
Sample
250203-w4hz6s1kbj
-
MD5
9706c540dd26ade6bf85b4bbcb9f483a
-
SHA1
f088af13fa12f99e41f748939dfeaece88546480
-
SHA256
33192e2c62761c054586d32d3a36a37f02dc6294e0326abd252e819efeb736bc
-
SHA512
83b4abc06b99f6fd4ec15974273e8e8490819c9feff061232e147214c8a786995e14368e1ded1ca9268a6776a6b8e6acb4454f3b0d20834c11e4d36d95d470b8
-
SSDEEP
786432:VO8Zj0154/RAKyX4oW4SrV6cfvmKaEYxfmTTHQc7p+guPGMB78NWGm0aLMtxx790:NZwOZYX4b4SrtfeKhY9p6EvGMB78oGm4
Static task
static1
Behavioral task
behavioral1
Sample
Silent XMR Miner Builder.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
stealerium
https://api.telegram.org/bot7665465643:AAHovJK8wV9ZYD10sdy6ONMxUF7l77R6hlE/sendMessage?chat_id=
-
url
https://szurubooru.zulipchat.com/api/v1/messages
Targets
-
-
Target
Silent XMR Miner Builder.exe
-
Size
44.7MB
-
MD5
9706c540dd26ade6bf85b4bbcb9f483a
-
SHA1
f088af13fa12f99e41f748939dfeaece88546480
-
SHA256
33192e2c62761c054586d32d3a36a37f02dc6294e0326abd252e819efeb736bc
-
SHA512
83b4abc06b99f6fd4ec15974273e8e8490819c9feff061232e147214c8a786995e14368e1ded1ca9268a6776a6b8e6acb4454f3b0d20834c11e4d36d95d470b8
-
SSDEEP
786432:VO8Zj0154/RAKyX4oW4SrV6cfvmKaEYxfmTTHQc7p+guPGMB78NWGm0aLMtxx790:NZwOZYX4b4SrtfeKhY9p6EvGMB78oGm4
-
Stealerium family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Obfuscated Files or Information
1Command Obfuscation
1