General
-
Target
745787747877.bin.zip
-
Size
194KB
-
Sample
200512-94jhrfhyfj
-
MD5
6619d58fc454ec1d0deb24641a0b915a
-
SHA1
11cb9eab9ab214f88fd23f3d8697a6a4dc65e7ca
-
SHA256
a60891c8a1d77512c14952979fce1cf3713c217d01b07a2725706a0332574774
-
SHA512
d4950a173a3885019d3d13d1216b8c71cbb73af4021da1bf84536dbe731dd6cdc1e2f37c63c387376a7af6559665c0f9eb726d40ab158b0dd84bde2c104e2ea9
Static task
static1
Behavioral task
behavioral1
Sample
745787747877.bin.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
745787747877.bin.exe
Resource
win10v200430
Malware Config
Extracted
Protocol: smtp- Host:
smtp.ionos.fr - Port:
587 - Username:
contact@estfacades.fr - Password:
Kayseri38&
Targets
-
-
Target
745787747877.bin
-
Size
402KB
-
MD5
fa07ab12e32195ccf094985892d70cf2
-
SHA1
78ef4a2709ab08aa7c62961991388cacfab3c353
-
SHA256
a1cb58fb08f1a05994840af272013f82d390dddb0c22260d028c8e20d5320d68
-
SHA512
8ad30924a9be8b185ae22a78a0a511caa06d6bc753087a4cc7f439bd9190a866adc504815f0aaa5445bd9e998abebc98ad39c2cae1babd95724931e96656e7d1
Score10/10-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-