General
-
Target
setup.exe
-
Size
6.3MB
-
Sample
240217-x4yajaae82
-
MD5
12ed79692bf630627105c30d92c76fd3
-
SHA1
a6bb689316d87268559d38dfb5340bd4b6f01423
-
SHA256
98ac8964b677346d7f5b012327eaddf5102255f1abf256e4951893fbc5759816
-
SHA512
e275c29fd058209eb5239282c9100a913e6a1845fa53c5cce0d23465806d651553515cbdc97df20f90ea2ff9d2b50130b0aab12fd9ae7e15503e88ccce43172e
-
SSDEEP
98304:0As++BUHecpbpx+sborjZGS/mJ7oRXnH9EEkXPEJLaiSYtK19jNCNX8sz:0AKBx4px+sNE32pPEJOqAIVz
Static task
static1
Behavioral task
behavioral1
Sample
setup.exe
Resource
win7-20231129-en
Malware Config
Extracted
http://good2-led.com/dark4.bs64
Extracted
stealc
http://94.156.65.61
-
url_path
/129edec4272dc2c8.php
Targets
-
-
Target
setup.exe
-
Size
6.3MB
-
MD5
12ed79692bf630627105c30d92c76fd3
-
SHA1
a6bb689316d87268559d38dfb5340bd4b6f01423
-
SHA256
98ac8964b677346d7f5b012327eaddf5102255f1abf256e4951893fbc5759816
-
SHA512
e275c29fd058209eb5239282c9100a913e6a1845fa53c5cce0d23465806d651553515cbdc97df20f90ea2ff9d2b50130b0aab12fd9ae7e15503e88ccce43172e
-
SSDEEP
98304:0As++BUHecpbpx+sborjZGS/mJ7oRXnH9EEkXPEJLaiSYtK19jNCNX8sz:0AKBx4px+sNE32pPEJOqAIVz
-
Blocklisted process makes network request
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-