General
-
Target
look_presentation_s4u.js
-
Size
1.4MB
-
Sample
200417-xwx2byr11x
-
MD5
a7f767779dd68f33392a2162ff9392d6
-
SHA1
4c78f182d039cdf20c8d569ff6f6410d0bca7c50
-
SHA256
44f7552b9707171e3b0e9f7ce8fbca5aee06ad5e47787cbaf5c8ec78134db687
-
SHA512
f2bb65dcad91a71f9b7a0ecc1db59ed19024549b279546c384b266a0ad430a2b9697e3aaf6a38e511eb4fc32ab1c7fafa8df657fdb352339d6b597e04cffc0e7
Static task
static1
Behavioral task
behavioral1
Sample
look_presentation_s4u.js
Resource
win7v200410
Malware Config
Targets
-
-
Target
look_presentation_s4u.js
-
Size
1.4MB
-
MD5
a7f767779dd68f33392a2162ff9392d6
-
SHA1
4c78f182d039cdf20c8d569ff6f6410d0bca7c50
-
SHA256
44f7552b9707171e3b0e9f7ce8fbca5aee06ad5e47787cbaf5c8ec78134db687
-
SHA512
f2bb65dcad91a71f9b7a0ecc1db59ed19024549b279546c384b266a0ad430a2b9697e3aaf6a38e511eb4fc32ab1c7fafa8df657fdb352339d6b597e04cffc0e7
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-