General
-
Target
f14d5c43a154a97b88e9248ea68dfd8d6ba556e5c69a036ddfe29b0bcd0997f3
-
Size
864KB
-
Sample
250411-ck3exsxmz7
-
MD5
0ada4805864eb152aac338b3b7e0c2c3
-
SHA1
2b138c9c8d170f8528e76c651fa4936808fda187
-
SHA256
f14d5c43a154a97b88e9248ea68dfd8d6ba556e5c69a036ddfe29b0bcd0997f3
-
SHA512
26363264b39ac8b8df80e23a1a0023da06a8e868a80744673296bccf34194970d139551c6b7269afd7ad67433d50cfa475bd906f3d6f24300448d3b5541fc3c1
-
SSDEEP
24576:sC7p2oXb4/vRdTlJbuN3lASdnkdPLAQqRB:rl2YSv23bnkJLC
Static task
static1
Behavioral task
behavioral1
Sample
Renovation budget 2025.exe
Resource
win10v2004-20250410-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20250314-en
Malware Config
Extracted
stealerium
https://api.telegram.org/bot1793602819:AAH8OgHZZu1s3rSbuE-TXgo0Nkv70Q5Eld4/sendMessage?chat_id=
Targets
-
-
Target
Renovation budget 2025.exe
-
Size
880KB
-
MD5
f7dcf7a8592da17d6286225bf1386c71
-
SHA1
080b11d185c977ac71efad60ff8f02276b0c38aa
-
SHA256
4351c0ecaa58ebfc05cd96168092558816fc29fc15630bfcf8f30e7f97537c1b
-
SHA512
c47140f138e8de0b247a5e9ee048133f4a9d118742adf8bcd1b27eec229338bf6d07bfe175ffb137a66c99c7f71e4192245483ee3d3e600bef6b4e969da7f689
-
SSDEEP
24576:ZNvHEF2EXr4/vdBTlJVuN7FCSbtedxFYAqRmb:Hy2OSvk7vteLFRb
-
Guloader family
-
Stealerium family
-
Uses browser remote debugging
Can be used control the browser and steal sensitive information such as credentials and session cookies.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
$PLUGINSDIR/System.dll
-
Size
12KB
-
MD5
cff85c549d536f651d4fb8387f1976f2
-
SHA1
d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
-
SHA256
8dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
-
SHA512
531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
SSDEEP
192:Zjvco0qWTlt70m5Aj/lQ0sEWD/wtYbBHFNaDybC7y+XBz0QPi:FHQlt70mij/lQRv/9VMjzr
Score3/10 -
MITRE ATT&CK Enterprise v16
Persistence
Event Triggered Execution
1Netsh Helper DLL
1Modify Authentication Process
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1