General
-
Target
Emmett.mpa
-
Size
264KB
-
Sample
200706-xyrhcy4e8a
-
MD5
f2468454850c605558c6e959e07483b8
-
SHA1
78a426659ffff4152573b41a55270a868f8220f0
-
SHA256
f3bd51c1bd71274daa1112b90a478ab08ee9644c117cc5405b53d37b839e8fdc
-
SHA512
5628bd8f9dcea25426b6242296cb9c34f86cfa75a36b14829d001594f040a83043f538da796fcf14d9eedc8aaac24af8a53c780ac57d524d9b90f994ec4e1180
Static task
static1
Behavioral task
behavioral1
Sample
Emmett.mpa.dll
Resource
win7
Malware Config
Targets
-
-
Target
Emmett.mpa
-
Size
264KB
-
MD5
f2468454850c605558c6e959e07483b8
-
SHA1
78a426659ffff4152573b41a55270a868f8220f0
-
SHA256
f3bd51c1bd71274daa1112b90a478ab08ee9644c117cc5405b53d37b839e8fdc
-
SHA512
5628bd8f9dcea25426b6242296cb9c34f86cfa75a36b14829d001594f040a83043f538da796fcf14d9eedc8aaac24af8a53c780ac57d524d9b90f994ec4e1180
-
Deletes itself
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-