General
-
Target
Inquired Order JULY 07.exe
-
Size
647KB
-
Sample
200707-bq9sebrl96
-
MD5
d7c67c7b8828726f9162a31f13ae9384
-
SHA1
7a2e1b9d65f949f66b2636f706e8d5219b485af6
-
SHA256
a4ae57283aed9c08180d74dfadb082d76e10cb6f4b01a45d1145c60f651da100
-
SHA512
c100cc2455ae12dc4bbc000b4b79cf454060d9dc6591033d15c6e2b19a3370863a38f05c2c24c9b977a9dc53a8db24d3c3aa7dab5344cc59b4ded278b2d850a1
Static task
static1
Behavioral task
behavioral1
Sample
Inquired Order JULY 07.exe
Resource
win7
Behavioral task
behavioral2
Sample
Inquired Order JULY 07.exe
Resource
win10v200430
Malware Config
Targets
-
-
Target
Inquired Order JULY 07.exe
-
Size
647KB
-
MD5
d7c67c7b8828726f9162a31f13ae9384
-
SHA1
7a2e1b9d65f949f66b2636f706e8d5219b485af6
-
SHA256
a4ae57283aed9c08180d74dfadb082d76e10cb6f4b01a45d1145c60f651da100
-
SHA512
c100cc2455ae12dc4bbc000b4b79cf454060d9dc6591033d15c6e2b19a3370863a38f05c2c24c9b977a9dc53a8db24d3c3aa7dab5344cc59b4ded278b2d850a1
Score7/10-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-