General
-
Target
my_attach_w6a.js
-
Size
3.5MB
-
Sample
200510-e7dkvxd5mn
-
MD5
41f0a90ea0ea504797e3532855e0f84e
-
SHA1
f1bfd6388010c52ffeb7ad715777d336606578f2
-
SHA256
f9618a3874287470fdf554b82d5466a6c2a39344ec24c0eb82ad810725954a8d
-
SHA512
50c5099240adbf4b1c4ccd4084ce17937ec7e64aa2cb4a43fa1f674396660e803fcc8fe8dbab1e0f378e15cd932fb92bcded637fee1921fe627da8aebf24956e
Static task
static1
Behavioral task
behavioral1
Sample
my_attach_w6a.js
Resource
win7v200430
Malware Config
Targets
-
-
Target
my_attach_w6a.js
-
Size
3.5MB
-
MD5
41f0a90ea0ea504797e3532855e0f84e
-
SHA1
f1bfd6388010c52ffeb7ad715777d336606578f2
-
SHA256
f9618a3874287470fdf554b82d5466a6c2a39344ec24c0eb82ad810725954a8d
-
SHA512
50c5099240adbf4b1c4ccd4084ce17937ec7e64aa2cb4a43fa1f674396660e803fcc8fe8dbab1e0f378e15cd932fb92bcded637fee1921fe627da8aebf24956e
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-