General
-
Target
client.exe
-
Size
61KB
-
Sample
200512-e1ctv8a86n
-
MD5
b8edb3062e489a16fd49868c18731a55
-
SHA1
018a392975a8731735ef709e6418e5af19db3756
-
SHA256
f0c0c989b018ee24cbd7548cec4e345fd34f491d350983fddb5ddc1ad1f4ba9f
-
SHA512
6793968fab16a332217cff0a876a6e1355859b4dabb93a6362eec3412d029d7c7e3c957e136dfaa1f984527710cdef01abc27072f66ba45ded6758471a04fa12
Static task
static1
Behavioral task
behavioral1
Sample
client.exe
Resource
win7v200430
Malware Config
Extracted
C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txt
hakbit
Contact: [email protected]
Targets
-
-
Target
client.exe
-
Size
61KB
-
MD5
b8edb3062e489a16fd49868c18731a55
-
SHA1
018a392975a8731735ef709e6418e5af19db3756
-
SHA256
f0c0c989b018ee24cbd7548cec4e345fd34f491d350983fddb5ddc1ad1f4ba9f
-
SHA512
6793968fab16a332217cff0a876a6e1355859b4dabb93a6362eec3412d029d7c7e3c957e136dfaa1f984527710cdef01abc27072f66ba45ded6758471a04fa12
Score10/10-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service
-