General
-
Target
presentation_p1f.js
-
Size
1.3MB
-
Sample
200417-1s1flaja3x
-
MD5
5024d780ce83091c9e3ec1501b1cce19
-
SHA1
4f9c3b9aa21a5a4b638eef3902d26f2f562a0ed5
-
SHA256
55a1a3a43322e94c4a2d9363a72aec52b16b7fc591f23601de1cfcb85559558c
-
SHA512
96b888f75ac39d56510f8f3aac763bb32182a69c77f649b6349789d84f848ea2057d54a4b3e72ae3318c47814edb4311c57d93add609eb9e2c0334c3e8f5d2ba
Static task
static1
Behavioral task
behavioral1
Sample
presentation_p1f.js
Resource
win7v200410
Malware Config
Targets
-
-
Target
presentation_p1f.js
-
Size
1.3MB
-
MD5
5024d780ce83091c9e3ec1501b1cce19
-
SHA1
4f9c3b9aa21a5a4b638eef3902d26f2f562a0ed5
-
SHA256
55a1a3a43322e94c4a2d9363a72aec52b16b7fc591f23601de1cfcb85559558c
-
SHA512
96b888f75ac39d56510f8f3aac763bb32182a69c77f649b6349789d84f848ea2057d54a4b3e72ae3318c47814edb4311c57d93add609eb9e2c0334c3e8f5d2ba
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-