General
-
Target
xeFOiPg.exe
-
Size
250KB
-
Sample
250312-qcjvha1vdv
-
MD5
5aff11719c4c103ff52a475590df5ef8
-
SHA1
003dbb830763a042f35a059fbe90d9dd250760ba
-
SHA256
c410086431e2227dafc6ab20710899af080d9fff4f2e58274709998c9af43e04
-
SHA512
d8c5986957c2d569d95183c4690d32f983297bc08362ae851d5170eb80b58b90b9c380d4e533b2042860cbda34c4d5b1f919b360f38472ef5feec79e51155c76
-
SSDEEP
6144:rMgYzCTvjBrWl2c0oK/rqf5S+oDfDAOjG33:wTCTvVrWlsW4+o/wH
Static task
static1
Behavioral task
behavioral1
Sample
xeFOiPg.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
xeFOiPg.exe
Resource
win10v2004-20250217-en
Malware Config
Targets
-
-
Target
xeFOiPg.exe
-
Size
250KB
-
MD5
5aff11719c4c103ff52a475590df5ef8
-
SHA1
003dbb830763a042f35a059fbe90d9dd250760ba
-
SHA256
c410086431e2227dafc6ab20710899af080d9fff4f2e58274709998c9af43e04
-
SHA512
d8c5986957c2d569d95183c4690d32f983297bc08362ae851d5170eb80b58b90b9c380d4e533b2042860cbda34c4d5b1f919b360f38472ef5feec79e51155c76
-
SSDEEP
6144:rMgYzCTvjBrWl2c0oK/rqf5S+oDfDAOjG33:wTCTvVrWlsW4+o/wH
Score10/10-
Detect Poverty Stealer Payload
-
Povertystealer family
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-