Analysis

  • max time kernel
    127s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/03/2025, 20:40

General

  • Target

    req_installer.exe

  • Size

    10.5MB

  • MD5

    5a6077a399e8171f76653aab7e236bd8

  • SHA1

    84c45bf20a882eda1145d197ded2060af73260be

  • SHA256

    348cd77684a19409bca9803d5a7c29b8a79b0f902ea3866c225cdc4c15d74e22

  • SHA512

    82cd8f395548ad26060ae8cd927e3dfb3f27a8f962fe3c735911caeee3f5f362ccb9670d047f428c0aa48767302e44611ece854681285f14cb2af08e92a49955

  • SSDEEP

    196608:wliIE7SRpozaH7DkhtL2Vmd6+D0JJVAzDaku9QFzFdH8EQGCfkF6Lhy1f:uiIE7Yo2HvGL2Vmd6m0JJVAzDakhFznL

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Loads dropped DLL 41 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 34 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\req_installer.exe
    "C:\Users\Admin\AppData\Local\Temp\req_installer.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5876
    • C:\Users\Admin\AppData\Local\Temp\req_installer.exe
      "C:\Users\Admin\AppData\Local\Temp\req_installer.exe"
      2⤵
      • Drops startup file
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c "ver"
        3⤵
          PID:3016
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c "tasklist"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:3644
          • C:\Windows\system32\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2324

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\Crypto\Cipher\_raw_cbc.pyd

      Filesize

      12KB

      MD5

      0c46d7b7cd00b3d474417de5d6229c41

      SHA1

      825bdb1ea8bbfe7de69487b76abb36196b5fdac0

      SHA256

      9d0a5c9813ad6ba129cafef815741636336eb9426ac4204de7bc0471f7b006e1

      SHA512

      d81b17b100a052899d1fd4f8cea1b1919f907daa52f1bad8dc8e3f5afc230a5bca465bbac2e45960e7f8072e51fdd86c00416d06cf2a1f07db5ad8a4e3930864

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\Crypto\Cipher\_raw_cfb.pyd

      Filesize

      13KB

      MD5

      3142c93a6d9393f071ab489478e16b86

      SHA1

      4fe99c817ed3bcc7708a6631f100862ebda2b33d

      SHA256

      5ea310e0f85316c8981ed6293086a952fa91a6d12ca3f8af9581521ee2b15586

      SHA512

      dcafec54bd9f9f42042e6fa4ac5ed53feb6cf8d56ada6a1787cafc3736aa72f14912bbd1b27d0af87e79a6d406b0326602ecd1ad394acdc6275aed4c41cdb9ef

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\Crypto\Cipher\_raw_ctr.pyd

      Filesize

      14KB

      MD5

      a34f499ee5f1b69fc4fed692a5afd3d6

      SHA1

      6a37a35d4f5f772dab18e1c2a51be756df16319a

      SHA256

      4f74bcf6cc81bac37ea24cb1ef0b17f26b23edb77f605531857eaa7b07d6c8b2

      SHA512

      301f7c31dee8ff65bb11196f255122e47f3f1b6b592c86b6ec51ab7d9ac8926fecfbe274679ad4f383199378e47482b2db707e09d73692bee5e4ec79c244e3a8

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\Crypto\Cipher\_raw_ecb.pyd

      Filesize

      10KB

      MD5

      dedae3efda452bab95f69cae7aebb409

      SHA1

      520f3d02693d7013ea60d51a605212efed9ca46b

      SHA256

      6248fdf98f949d87d52232ddf61fada5ef02cd3e404bb222d7541a84a3b07b8a

      SHA512

      8c1cab8f34de2623a42f0750f182b6b9a7e2affa2667912b3660af620c7d9ad3bd5b46867b3c2d50c0cae2a1bc03d03e20e4020b7ba0f313b6a599726f022c6c

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\Crypto\Cipher\_raw_ofb.pyd

      Filesize

      12KB

      MD5

      a13584f663393f382c6d8d5c0023bc80

      SHA1

      d324d5fbd7a5dba27aa9b0bdb5c2aebff17b55b1

      SHA256

      13c34a25d10c42c6a12d214b2d027e5dc4ae7253b83f21fd70a091fedac1e049

      SHA512

      14e4a6f2959bd68f441aa02a4e374740b1657ab1308783a34d588717f637611724bc90a73c80fc6b47bc48dafb15cf2399dc7020515848f51072f29e4a8b4451

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\Crypto\Hash\_BLAKE2s.pyd

      Filesize

      14KB

      MD5

      06d3e941860bb0abedf1baf1385d9445

      SHA1

      e8c16c3e8956ba99a2d0de860dcfc5021f1d7de5

      SHA256

      1c340d2625dad4f07b88bb04a81d5002aabf429561c92399b0eb8f6a72432325

      SHA512

      6f62acff39b77c1ec9f161a9bfa94f8e3b932d56e63daee0093c041543993b13422e12e29c8231d88bc85c0573ad9077c56aa7f7a307e27f269da17fba8ee5a3

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\Crypto\Util\_strxor.pyd

      Filesize

      10KB

      MD5

      fae081b2c91072288c1c8bf66ad1aba5

      SHA1

      cd23ddb83057d5b056ca2b3ab49c8a51538247de

      SHA256

      af76a5b10678f477069add6e0428e48461fb634d9f35fb518f9f6a10415e12d6

      SHA512

      0adb0b1088cb6c8f089cb9bf7aec9eeeb1717cf6cf44b61fb0b053761fa70201ab3f7a6461aaae1bc438d689e4f8b33375d31b78f1972aa5a4bf86afad66d3a4

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\VCRUNTIME140.dll

      Filesize

      94KB

      MD5

      a87575e7cf8967e481241f13940ee4f7

      SHA1

      879098b8a353a39e16c79e6479195d43ce98629e

      SHA256

      ded5adaa94341e6c62aea03845762591666381dca30eb7c17261dd154121b83e

      SHA512

      e112f267ae4c9a592d0dd2a19b50187eb13e25f23ded74c2e6ccde458bcdaee99f4e3e0a00baf0e3362167ae7b7fe4f96ecbcd265cc584c1c3a4d1ac316e92f0

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\VCRUNTIME140_1.dll

      Filesize

      36KB

      MD5

      37c372da4b1adb96dc995ecb7e68e465

      SHA1

      6c1b6cb92ff76c40c77f86ea9a917a5f854397e2

      SHA256

      1554b5802968fdb2705a67cbb61585e9560b9e429d043a5aa742ef3c9bbfb6bf

      SHA512

      926f081b1678c15dc649d7e53bfbe98e4983c9ad6ccdf11c9383ca1d85f2a7353d5c52bebf867d6e155ff897f4702fc4da36a8f4cf76b00cb842152935e319a6

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_asyncio.pyd

      Filesize

      64KB

      MD5

      43e7da594af7c0655cb9f57bd5556a49

      SHA1

      b75042853453e902ee54d0311311b4de74d40241

      SHA256

      6241f72162099095f111819fd5b9b2a0995ed7cf45ca08f1d0134ab7b3fe601a

      SHA512

      b088211220a6b73aa55e8ce1ed8d1517b25a5f53245abd9a07ba4c39518db9bd8742750d1f7f12c58955ee1ea642c733d4dca45bc7b67e1d18d25526806c4be9

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_bz2.pyd

      Filesize

      84KB

      MD5

      7f2bba8a38712d00907f6e37f0ce6028

      SHA1

      e22227fc0fd45afdcf6c5d31a1cebffee22dfc32

      SHA256

      cd04ebe932b2cb2fd7f01c25412bddd77b476fa47d0aff69a04a27d3bfe4b37b

      SHA512

      ca46ceaf1b6683e6d505edbe33b1d36f2940a72fc34f42fa4aa0928f918d836803113bf9a404657ec3a65bc4e40ed13117ad48457a048c82599db37f98b68af0

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_cffi_backend.cp39-win_amd64.pyd

      Filesize

      177KB

      MD5

      f3f610b10a640a09b423e1c7e327cad1

      SHA1

      007bf7000df98e4591bdbfc75e7a363457c692fd

      SHA256

      d112ae33247d896008d79a1a5f96b98d0eaee80d13372e64c2d88ffbd94fadf8

      SHA512

      28726490d1026ad6f2bbad949b247f904e4ceceef7011e7408c11e4fab886e77e84317e7a14e3e86c1b7178666b06e0a774734a497f91afff76882756e03b6b0

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_ctypes.pyd

      Filesize

      124KB

      MD5

      38d9d8ed2b7df64790150a2a523fd3b9

      SHA1

      a629c8e76136fa5678c758351e2dcff5324f51e7

      SHA256

      11daef02afe45d9f3987bab5c2b6ef75b2b6f6f79704c45675d532f090f14b8b

      SHA512

      7a37a98bb9824680e3f0030e0db795f9eab1cc4d2b6605e4f6c37d432b4de0642481dd7b6c6f0e53264f2d940b4800555ab0d84145d7de35f4a65a26ca100fe8

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_decimal.pyd

      Filesize

      265KB

      MD5

      1139cc9d936b6028305749568ec5cac7

      SHA1

      8aee810bc2ccfc3c36bef6ed59b3826bb7070299

      SHA256

      67a47d85cc1a21069610c85da64fc031231d43af7876dfc48361c57d88efee0b

      SHA512

      1dd4cf64d51a4d9b9f35f1932428f92a3ef538db62b503097a9dfc1940afae59b0d890aca149a67ff1bd5d343d8e4f38cadd49065404e9cb2902f1ed6dbb754b

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_hashlib.pyd

      Filesize

      63KB

      MD5

      75ed91d3b7a40eca5b32a13b90191ead

      SHA1

      320bd4b6116f735d8508382738e50ba8862b8029

      SHA256

      202535a5ceb0bf70c2046639a3884c24f2cccb1bd92827e61b5a7a663d9399ba

      SHA512

      0eb81335c97842233751e7b4c0d6581accaf00a86f3e06fe35b2c80bd6badf83a321eaf4a449a31238ed3f60aa09890769bf54775cd7efd5112255842e1582c2

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_lzma.pyd

      Filesize

      159KB

      MD5

      ad02ea81a127a401f4df84c082f3cce6

      SHA1

      9c6c851c52f331d17a33936c9aad8dcef2542709

      SHA256

      4213fbb6936ad3eac1e1ba28f10e15719176bc3a59ff01ddc6828dd7eee52132

      SHA512

      cdccd9e5fffc2a2836f7677985d63c0a8a90fc91f1d98a0f2355c11141e21ecd564bbbfba87e717ac80f784a68b6f43430476fbd72cec9820c691df6612ffd16

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_multiprocessing.pyd

      Filesize

      30KB

      MD5

      7fcff5c455d0d1b0b9c5c247518360dc

      SHA1

      ab99ddd8457ffcb75910a694730e92c4efd84573

      SHA256

      cc6ff1cb52b57248f9fb49cee4a4ef868db12b3656cbc7bc6f11614357e183cf

      SHA512

      433b5ba66431eff4011e9599598aad5a58091c533f142464aef74934dbaf18b4beaf3e5e85cf36d9d05409698ee8914107cb24063a946d9c774263e2a7fce5be

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_overlapped.pyd

      Filesize

      45KB

      MD5

      5302eaf1e9af8e6550ab3720acf7ff63

      SHA1

      ce2dfdf34616a84a041ddaec025516ee6c5e2762

      SHA256

      42c7a03bffe76eafdee596f6b4c3ff950ff8808a31d194932c2bf48fdfc7f7c2

      SHA512

      7649a8356aff0b9f7012ca25a433771e84a722a3eda0608226d5871828d5a3e5c7eca009ae9c32d02bc01a5ceceb972f35d9ec9bf538f3151145469769c8ebf6

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_queue.pyd

      Filesize

      29KB

      MD5

      f9718fe21174d8428f022aaf60bf92da

      SHA1

      db7e85eaa7c795792050af43d47518ca7fa7878a

      SHA256

      95e1c419e08d8ab229b8c64d51fd301cd9d75a659dfc05e75b0317ca0a4f22e3

      SHA512

      000929c994446f22e4f11a011c21b7401bbe8b3b1a624b80a4eeb818f94190b3db2782b00e477e548814caea5234d4de5a8a766d72365c26654d655ec4546be3

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_socket.pyd

      Filesize

      78KB

      MD5

      0a6c6fd7697e4c3757014fa6bf6dd615

      SHA1

      f14f79831b8b16a7b31f4c7f698317c023d446f9

      SHA256

      a611e9b4f4e5fe67e945b771d79cf15c48441ecfa11ce186cec9bf233dc20c0d

      SHA512

      f5fcfede06f0f81229b946f803b6e292fd0c909191f3c2a82ca317ff7c2e08d1ea98aa2d11ec85edd5449994a2a7c61318a15d47806cd761e25739494f3e18e6

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_sqlite3.pyd

      Filesize

      88KB

      MD5

      1b7e6b8d16b0800917a1f5a88b73ff81

      SHA1

      a7bf3e6e6a5cfe990d2ee586fb7b08b26ced58fa

      SHA256

      a831f3eb5da12bfa9606f8a947f677cfb0f3790e2b7c8f046add7e5af566e688

      SHA512

      22a6a6ca295ae552cd98757fac789d2b14f9af6769919f35a41887ce47f5031bd1ff1764af0d7b537c376b7b090af8f2dff0ece6885e1755e8d3fcef97e72708

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_ssl.pyd

      Filesize

      152KB

      MD5

      3baf56d4e63a800fcaf2cc98fc120709

      SHA1

      2a33341eda4b4549452b6db9b259f8ae6ec9c806

      SHA256

      d7610dd6be63aada4fe1895b64bbac961840257c6988e1f68bbf3d8e486b5a45

      SHA512

      e48899ed5581fe9f45c02219d62e0acbc92906af5b7a3b7d9be1bb28b41f5cfdb0d3496abc6d0c1a809bb80d2a49c5a456d34e4667995fb88ef8aca6958881dd

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\_uuid.pyd

      Filesize

      23KB

      MD5

      efaab22452b7d55bd684f29d7df015a0

      SHA1

      ed9a244f5cce66b69fa275704ba8048c3956db91

      SHA256

      d8b97bd2d8d372b5b7675f5ec8a31a7f7d01ab36dd8c8273273b4c465b70c4e5

      SHA512

      af7e6535c8e0c540e0be69a164c00fbf03c572faea871a377db72937a8a54e015ea278fe8981d9a27daf9bfc094aeefd036e5b143c58b776afe995d4b503790a

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\base_library.zip

      Filesize

      828KB

      MD5

      a65bddfd641d60a517f5fe886b57124c

      SHA1

      715f27a3179eebeeb2182073f29bfd87d14ebe3a

      SHA256

      1e20d7ab50f1c713970a62a9e6517f2bd0416f125a8ee5c3f481e6381f38cd3e

      SHA512

      25ca586b945c551151c8444d43886a1010d38539d45d02a2c88a7e5ab743b0d6028cf7d7f6f3559f7c98d8b40d751b37373f8ee2d6b51617f15488637e98ff5a

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\charset_normalizer\md.cp39-win_amd64.pyd

      Filesize

      10KB

      MD5

      c184ee3667af1d9c2e689ff0d3680291

      SHA1

      471e9dae2c192a1989f5ae06cf6dbfc28e3e6fa8

      SHA256

      89473f1ad63efb6b963b4245586a793744184ce6a77866bec67d1a1c3291d1bb

      SHA512

      37ed7958de23943bd6527a13f96ccaca920c8a77b6c4bfe82a75a1e1d0a046c49a0e711a3f9bb9b06ced3054b59813d7c876bcc5233bac1a5b683dc2c6b60025

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\charset_normalizer\md__mypyc.cp39-win_amd64.pyd

      Filesize

      112KB

      MD5

      487c803c972be9ea0aa0eda17821bcf6

      SHA1

      74e7f59848a968e13c45871ef443b2e648e76e00

      SHA256

      63c280eff61e276fe3b0fc1f4cbdc7e62b84d6660a57ecd3bb90aeb4d2515f1c

      SHA512

      b8f6eb9a99484f529a52c37966063d1785077a64013b1eecb892ecf4389a327288bdb9c69583a9321633a813658e4451b97849978f7be41506526272ddd3afaf

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\libcrypto-1_1.dll

      Filesize

      3.3MB

      MD5

      ab01c808bed8164133e5279595437d3d

      SHA1

      0f512756a8db22576ec2e20cf0cafec7786fb12b

      SHA256

      9c0a0a11629cced6a064932e95a0158ee936739d75a56338702fed97cb0bad55

      SHA512

      4043cda02f6950abdc47413cfd8a0ba5c462f16bcd4f339f9f5a690823f4d0916478cab5cae81a3d5b03a8a196e17a716b06afee3f92dec3102e3bbc674774f2

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\libffi-7.dll

      Filesize

      32KB

      MD5

      eef7981412be8ea459064d3090f4b3aa

      SHA1

      c60da4830ce27afc234b3c3014c583f7f0a5a925

      SHA256

      f60dd9f2fcbd495674dfc1555effb710eb081fc7d4cae5fa58c438ab50405081

      SHA512

      dc9ff4202f74a13ca9949a123dff4c0223da969f49e9348feaf93da4470f7be82cfa1d392566eaaa836d77dde7193fed15a8395509f72a0e9f97c66c0a096016

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\libssl-1_1.dll

      Filesize

      682KB

      MD5

      de72697933d7673279fb85fd48d1a4dd

      SHA1

      085fd4c6fb6d89ffcc9b2741947b74f0766fc383

      SHA256

      ed1c8769f5096afd000fc730a37b11177fcf90890345071ab7fbceac684d571f

      SHA512

      0fd4678c65da181d7c27b19056d5ab0e5dd0e9714e9606e524cdad9e46ec4d0b35fe22d594282309f718b30e065f6896674d3edce6b3b0c8eb637a3680715c2c

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\pyexpat.pyd

      Filesize

      200KB

      MD5

      82d5cf404925997d094202dabaf6f5e6

      SHA1

      4207d98c747b68ccfaf911c87bc7715814454d15

      SHA256

      9e90ade54232d61d106b182326085fc843c8b48b363733865abe40652d78614c

      SHA512

      12276495c2b504b4ebe83514b9231199beab86459217591e7446e97e4ab2c92413bf3c3cef83877fa4ea698b04c8df4ec1cbb7579f22c5686625397f0ce0aae3

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\python39.dll

      Filesize

      4.3MB

      MD5

      19e6d310c1bd0578d468a888d3ec0e3d

      SHA1

      32561ad9b89dc9e9a086569780890ad10337e698

      SHA256

      f4609ec3bbcc74ed9257e3440ec15adf3061f7162a89e4e9a370e1c2273370a1

      SHA512

      4a8332c22a40a170ea83fc8cfd5b8a0ed0df1d59fd22ebe10088ba0be78cc0e91a537d7085549a4d06204cbe77e83154a812daed885c25aa4b4cb4aca5b9cc85

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\select.pyd

      Filesize

      28KB

      MD5

      196c4d2f8bdc9e9d2dbcce866050684c

      SHA1

      1166c85c761d8188c45d9cc7441abfe8a7071132

      SHA256

      cd31f9f557d57a6909186940eafe483c37de9a7251e604644a747c7ec26b7823

      SHA512

      cb9a02530721482f0ff912ca65dae94f6930676e2390cb5523f99452174622d7e2e70cafaf46e053f0c3dfc314edc8c2f4fd3bc7ea888be81e83ff40d3a30e78

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\sqlite3.dll

      Filesize

      1.5MB

      MD5

      7e1348caeb9f0e0d8356110b3801476a

      SHA1

      b13411049bfa2968683e4655270bb65b1dc67659

      SHA256

      2e5dee18e25fa8115b84285da45b910142141ea734f34570cd6ec03f74212ae9

      SHA512

      aaa6c1811d7b494b42a7992d387776e4b8de55fb0f33a3a461dfc5b528964f8f3d83ad770b0077a0ed2bfcb47961608d0ee62529b7cc6940da22dfc4d878178b

    • C:\Users\Admin\AppData\Local\Temp\_MEI58762\unicodedata.pyd

      Filesize

      1.1MB

      MD5

      684ae6992f55ad6c64588367e42f44f7

      SHA1

      66d8868286924ada60966a620dffe87b2c978711

      SHA256

      91834e28cc0acbd966dc6d323b95113e0050301b7cd6cd4abe43390f2bbddb34

      SHA512

      70453ee98cbf6365aa7a326520cdad438d6a1d6f463da6180cb5e20708647951831d232b577be50a16825912a9e40386c64a9987e3265fc870cddd918b31614c