General
-
Target
stand.exe
-
Size
17.8MB
-
Sample
250329-2tcy3axlt9
-
MD5
4e45d159b2f482edac2ba45713c335a2
-
SHA1
1b97c1e523ed4add9d952842a920b0c42ceacfb4
-
SHA256
05ac40c0f8950fd6800e6663062d2a27cc466c5d3e2df8f50200fc1787e516f3
-
SHA512
2a041d04cb5be086bae31a49d9eec94187fbd7459803111017421fde76f968f6369c78060ccafb22a59781f55730f446343df104fd0383ac2b336411b3554ed6
-
SSDEEP
98304:QN4aC69mw0GrEW1bSc1AzMjir7ifGB0Kn9JtxTbF:Q270mw9bScyM4WObn9J3
Behavioral task
behavioral1
Sample
stand.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
stand.exe
Resource
win10v2004-20250314-en
Malware Config
Targets
-
-
Target
stand.exe
-
Size
17.8MB
-
MD5
4e45d159b2f482edac2ba45713c335a2
-
SHA1
1b97c1e523ed4add9d952842a920b0c42ceacfb4
-
SHA256
05ac40c0f8950fd6800e6663062d2a27cc466c5d3e2df8f50200fc1787e516f3
-
SHA512
2a041d04cb5be086bae31a49d9eec94187fbd7459803111017421fde76f968f6369c78060ccafb22a59781f55730f446343df104fd0383ac2b336411b3554ed6
-
SSDEEP
98304:QN4aC69mw0GrEW1bSc1AzMjir7ifGB0Kn9JtxTbF:Q270mw9bScyM4WObn9J3
-
Detect SalatStealer payload
-
Salatstealer family
-
Drops file in Drivers directory
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Drops file in System32 directory
-