General
-
Target
order details.EXCEL.XLSx.xls.io.exe
-
Size
359KB
-
Sample
200707-a465v572wa
-
MD5
140e89a0319fc70aa12f5523cb2df432
-
SHA1
b08e8aca4dd650de5ef73f13ebc3eba71da12655
-
SHA256
d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588
-
SHA512
e8c4f988cbff65bebecd4bfcda3473a354f2dac1bf646dab930c08924d876a11b937004859800b5544f2de7c5a73a3771b8275a16540dca6c9c876afff846020
Static task
static1
Behavioral task
behavioral1
Sample
order details.EXCEL.XLSx.xls.io.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
order details.EXCEL.XLSx.xls.io.exe
Resource
win10
Malware Config
Targets
-
-
Target
order details.EXCEL.XLSx.xls.io.exe
-
Size
359KB
-
MD5
140e89a0319fc70aa12f5523cb2df432
-
SHA1
b08e8aca4dd650de5ef73f13ebc3eba71da12655
-
SHA256
d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588
-
SHA512
e8c4f988cbff65bebecd4bfcda3473a354f2dac1bf646dab930c08924d876a11b937004859800b5544f2de7c5a73a3771b8275a16540dca6c9c876afff846020
-
Deletes itself
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-
Suspicious use of SetThreadContext
-