General
-
Target
pliant.dll
-
Size
270KB
-
Sample
200611-3qdpbm3y6a
-
MD5
019c152a88c2efc4c7b42458a48f7f5c
-
SHA1
1e6cc277d46f5fd5e7b915980deb8725c4a71726
-
SHA256
d8885ce1f08167becda151811c6519af1bac2ad835acf60c7fa1130dad28fcd7
-
SHA512
15457c7e7406aacf90bcdb281c3b00fc0f37923dfe660f23c4889a48091f877de6f7662bc13ee7c68cb6bb7bb39c1973d71ad4a8b50769893978c5163a64cfad
Static task
static1
Behavioral task
behavioral1
Sample
pliant.dll
Resource
win7v200430
Malware Config
Targets
-
-
Target
pliant.dll
-
Size
270KB
-
MD5
019c152a88c2efc4c7b42458a48f7f5c
-
SHA1
1e6cc277d46f5fd5e7b915980deb8725c4a71726
-
SHA256
d8885ce1f08167becda151811c6519af1bac2ad835acf60c7fa1130dad28fcd7
-
SHA512
15457c7e7406aacf90bcdb281c3b00fc0f37923dfe660f23c4889a48091f877de6f7662bc13ee7c68cb6bb7bb39c1973d71ad4a8b50769893978c5163a64cfad
-
Deletes itself
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-