General
-
Target
Zahlungsbestätigung.exe
-
Size
583KB
-
Sample
200707-4la3ae3f7x
-
MD5
3c330f32f0b8812e072568e98adf1f1c
-
SHA1
cd1a65820235eeb9e6655e8290326f422270115c
-
SHA256
be4e6e428abbddc9ae13c274c65f86d9633a274ee45aaff9c32311b1a0e2b471
-
SHA512
db394c95c979fa5637e142210cb7119f9f72af11f6daf9dacae6862452ebf479f9622baed66067345e6f3519890820b70cafcd51f2487ce6d9b831b7823a0447
Static task
static1
Behavioral task
behavioral1
Sample
Zahlungsbestätigung.exe
Resource
win7
Malware Config
Targets
-
-
Target
Zahlungsbestätigung.exe
-
Size
583KB
-
MD5
3c330f32f0b8812e072568e98adf1f1c
-
SHA1
cd1a65820235eeb9e6655e8290326f422270115c
-
SHA256
be4e6e428abbddc9ae13c274c65f86d9633a274ee45aaff9c32311b1a0e2b471
-
SHA512
db394c95c979fa5637e142210cb7119f9f72af11f6daf9dacae6862452ebf479f9622baed66067345e6f3519890820b70cafcd51f2487ce6d9b831b7823a0447
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-