General
-
Target
SilentXMRMinerBuilder.exe
-
Size
44.7MB
-
Sample
250203-xadn2a1lem
-
MD5
9706c540dd26ade6bf85b4bbcb9f483a
-
SHA1
f088af13fa12f99e41f748939dfeaece88546480
-
SHA256
33192e2c62761c054586d32d3a36a37f02dc6294e0326abd252e819efeb736bc
-
SHA512
83b4abc06b99f6fd4ec15974273e8e8490819c9feff061232e147214c8a786995e14368e1ded1ca9268a6776a6b8e6acb4454f3b0d20834c11e4d36d95d470b8
-
SSDEEP
786432:VO8Zj0154/RAKyX4oW4SrV6cfvmKaEYxfmTTHQc7p+guPGMB78NWGm0aLMtxx790:NZwOZYX4b4SrtfeKhY9p6EvGMB78oGm4
Static task
static1
Behavioral task
behavioral1
Sample
SilentXMRMinerBuilder.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SilentXMRMinerBuilder.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
stealerium
https://api.telegram.org/bot7665465643:AAHovJK8wV9ZYD10sdy6ONMxUF7l77R6hlE/sendMessage?chat_id=
-
url
https://szurubooru.zulipchat.com/api/v1/messages
Extracted
gurcu
https://api.telegram.org/bot7665465643:AAHovJK8wV9ZYD10sdy6ONMxUF7l77R6hlE/getM
https://api.telegram.org/bot7665465643:AAHovJK8wV9ZYD10sdy6ONMxUF7l77R6hlE/sendMessage?chat_id=6810876826
Targets
-
-
Target
SilentXMRMinerBuilder.exe
-
Size
44.7MB
-
MD5
9706c540dd26ade6bf85b4bbcb9f483a
-
SHA1
f088af13fa12f99e41f748939dfeaece88546480
-
SHA256
33192e2c62761c054586d32d3a36a37f02dc6294e0326abd252e819efeb736bc
-
SHA512
83b4abc06b99f6fd4ec15974273e8e8490819c9feff061232e147214c8a786995e14368e1ded1ca9268a6776a6b8e6acb4454f3b0d20834c11e4d36d95d470b8
-
SSDEEP
786432:VO8Zj0154/RAKyX4oW4SrV6cfvmKaEYxfmTTHQc7p+guPGMB78NWGm0aLMtxx790:NZwOZYX4b4SrtfeKhY9p6EvGMB78oGm4
-
Gurcu family
-
Stealerium family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Obfuscated Files or Information: Command Obfuscation
Adversaries may obfuscate content during command execution to impede detection.
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Defense Evasion
Modify Authentication Process
1Obfuscated Files or Information
1Command Obfuscation
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1