General
-
Target
OVALWantlist0325.exe
-
Size
180KB
-
Sample
250404-hpwe3a11bt
-
MD5
081a892310290038e4ba646c488bad8e
-
SHA1
b3d36e18d2a94eb5060bb725a1d9a4e70629777d
-
SHA256
a777a2eec9933c95e419cce77b09cffb73f0c4afcffde00942b9665098aa7fb4
-
SHA512
44412a2305cd5d34825d2bd3b3857d0a724e57e9aca586e7d50d8314bd2b7cd717f4010c5632bce94452b8a3ddde0b2e4eeb0660bdba7f08309eef58358875f9
-
SSDEEP
3072:4ZkluvUjaqwHyXzid7sIMcTzMkg8j/xGc5ptYhlcNZ+XayDwVsSrgIN4ftnr:80u3SXzIvng8N3tMM+qw
Static task
static1
Behavioral task
behavioral1
Sample
OVALWantlist0325.exe
Resource
win10v2004-20250313-en
Malware Config
Extracted
Protocol: smtp- Host:
mail.lightstartrading.com - Port:
587 - Username:
[email protected] - Password:
Mushtryati$#@Mushtryati
Extracted
stealerium
Targets
-
-
Target
OVALWantlist0325.exe
-
Size
180KB
-
MD5
081a892310290038e4ba646c488bad8e
-
SHA1
b3d36e18d2a94eb5060bb725a1d9a4e70629777d
-
SHA256
a777a2eec9933c95e419cce77b09cffb73f0c4afcffde00942b9665098aa7fb4
-
SHA512
44412a2305cd5d34825d2bd3b3857d0a724e57e9aca586e7d50d8314bd2b7cd717f4010c5632bce94452b8a3ddde0b2e4eeb0660bdba7f08309eef58358875f9
-
SSDEEP
3072:4ZkluvUjaqwHyXzid7sIMcTzMkg8j/xGc5ptYhlcNZ+XayDwVsSrgIN4ftnr:80u3SXzIvng8N3tMM+qw
-
Stealerium family
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1