General
-
Target
0a0ae5d804271f56c1fa5e1e695cc514
-
Size
1.0MB
-
Sample
200619-7wsmkj8vh6
-
MD5
0a0ae5d804271f56c1fa5e1e695cc514
-
SHA1
e8d307b58856cd38c5b43f576a5dfd451f29b11c
-
SHA256
50119da56e84ae4baa207a9391a0143fe5aa66c212aeba08e2d6d864af0a0d83
-
SHA512
27d1a4cb2e8a62ea02191db8171d66d2cd485cae7649be03a65e5bf936d6d92e98a888d33b3c4826f47eae26b3e45cd8efeca7b73626ae9913b055fd2b5bfe11
Static task
static1
Behavioral task
behavioral1
Sample
0a0ae5d804271f56c1fa5e1e695cc514.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
0a0ae5d804271f56c1fa5e1e695cc514.exe
Resource
win10
Malware Config
Extracted
C:\README1.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Targets
-
-
Target
0a0ae5d804271f56c1fa5e1e695cc514
-
Size
1.0MB
-
MD5
0a0ae5d804271f56c1fa5e1e695cc514
-
SHA1
e8d307b58856cd38c5b43f576a5dfd451f29b11c
-
SHA256
50119da56e84ae4baa207a9391a0143fe5aa66c212aeba08e2d6d864af0a0d83
-
SHA512
27d1a4cb2e8a62ea02191db8171d66d2cd485cae7649be03a65e5bf936d6d92e98a888d33b3c4826f47eae26b3e45cd8efeca7b73626ae9913b055fd2b5bfe11
-
Modifies Installed Components in the registry
-
UPX packed file
Detects executables packed with UPX/modified UPX open source packer.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-
Checks for installed software on the system
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
js
-
Modifies service
-
Sets desktop wallpaper using registry
-