General
-
Target
9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.zip
-
Size
3.5MB
-
Sample
250210-tj267swqgk
-
MD5
05c8b10e14dc47f0fc6d608a62a2d8d5
-
SHA1
f2de3a1ceff42f5f103c0308450fce09c6e8f6b3
-
SHA256
0c59bb8942ce85a4b199d143a03bee76034e49be7186fe650376a50a1030f24d
-
SHA512
6dae3ac23ff7eacdb141a135254fe64625ba6699707dcc249ff1b8d5af7ae86f2367b2ea46dfc60e46a873b3cc6cf8f7b98cf33ff23ea160782d8118496d7124
-
SSDEEP
98304:hVL7MaQDsU2/vrnP1WDBepcKWV8YjD1wpIkt8ixpBRf2zkH:/vMaQo5nTPYtepdKRgpBRf1H
Behavioral task
behavioral1
Sample
9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489.exe
Resource
win10v2004-20250129-en
Malware Config
Extracted
stealerium
https://api.telegram.org/bot7570347185:AAEz_VpR809OhOYFdcL_J8sQ3jA3OcwYJ8E/sendMessage?chat_id=
-
url
https://szurubooru.zulipchat.com/api/v1/messages
Targets
-
-
Target
9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489
-
Size
3.6MB
-
MD5
33bc39d2b142aac254ce2c8efc8de27a
-
SHA1
95780b1b6c7f23f72b3e790d0809216bdfd670ba
-
SHA256
9296dbce8c2243ef03312fdc3b3ec19ad21bb16e56b6b88742f3551de67c6489
-
SHA512
eee09541f45bff4b304afd7e315711fcb9cc122f8418ea540d0a1672c149730dbbe51eb57a8344e0dfa15218d0ef5f78a2c67d25229fa564a62258ba0449c120
-
SSDEEP
98304:CEjdGSi3kqXf0FLYWCLbi6sfLxkuahjCOeX9YG9see5GnRyCAm0makxH13:k3kSILYWqZAkuujCPX9YG9he5GnQCAJS
-
Stealerium family
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1