General
-
Target
7c6e499ae9ce0cafb82e80413aaad59fae91422dd77f0c4392f5dc53cceaa467
-
Size
56KB
-
Sample
250227-3mgjcatsex
-
MD5
187c101c965a35b3e2949b942d435bfc
-
SHA1
9703c5536dbe2e7b1003d6c50f5c6c9b1f321320
-
SHA256
7c6e499ae9ce0cafb82e80413aaad59fae91422dd77f0c4392f5dc53cceaa467
-
SHA512
62a2175d084df7714ba2557afc544a946a449a24ac6a54d3c2eff4107ef1e4291680cb6e7bbb6b375aac575300d1c0592d66bb30ffa4aa2167d5b5124d1723e1
-
SSDEEP
1536:e6q10k0EFjed6rqJ+6vghzwYu7vih9GueIh9j2IoHAjUvJQ/johChPrdh4h3hUhh:E1oEFlt6vghzwYu7vih9GueIh9j2IoHU
Static task
static1
Behavioral task
behavioral1
Sample
7c6e499ae9ce0cafb82e80413aaad59fae91422dd77f0c4392f5dc53cceaa467.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7c6e499ae9ce0cafb82e80413aaad59fae91422dd77f0c4392f5dc53cceaa467.exe
Resource
win10v2004-20250217-en
Malware Config
Extracted
blihanstealer
pomdfghrt
-
user_agent
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; CIBA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)
Targets
-
-
Target
7c6e499ae9ce0cafb82e80413aaad59fae91422dd77f0c4392f5dc53cceaa467
-
Size
56KB
-
MD5
187c101c965a35b3e2949b942d435bfc
-
SHA1
9703c5536dbe2e7b1003d6c50f5c6c9b1f321320
-
SHA256
7c6e499ae9ce0cafb82e80413aaad59fae91422dd77f0c4392f5dc53cceaa467
-
SHA512
62a2175d084df7714ba2557afc544a946a449a24ac6a54d3c2eff4107ef1e4291680cb6e7bbb6b375aac575300d1c0592d66bb30ffa4aa2167d5b5124d1723e1
-
SSDEEP
1536:e6q10k0EFjed6rqJ+6vghzwYu7vih9GueIh9j2IoHAjUvJQ/johChPrdh4h3hUhh:E1oEFlt6vghzwYu7vih9GueIh9j2IoHU
Score10/10-
Blihanstealer family
-
Deletes itself
-
Executes dropped EXE
-
Adds Run key to start application
-