General
-
Target
nKeYpjZjYiPtCBn.exe
-
Size
552KB
-
Sample
200707-w2emdnph62
-
MD5
1bbb436c32d49a35d254c2b01a76e9e4
-
SHA1
0814a134aff6333245a7d26f127c20d87476d45f
-
SHA256
1ff82c607bc0fa4e4effc066ef05e092760f38c35a2426d9c44c64b85d60d53e
-
SHA512
7c020f91cb6dffc85d656b5db3a889d3cd29c5c6add5a2432b8e9710f10d182ebae391365b433f325355802151a936c7daadcbd8a44e7b0a445c175ea3c93d55
Static task
static1
Behavioral task
behavioral1
Sample
nKeYpjZjYiPtCBn.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
nKeYpjZjYiPtCBn.exe
Resource
win10
Malware Config
Targets
-
-
Target
nKeYpjZjYiPtCBn.exe
-
Size
552KB
-
MD5
1bbb436c32d49a35d254c2b01a76e9e4
-
SHA1
0814a134aff6333245a7d26f127c20d87476d45f
-
SHA256
1ff82c607bc0fa4e4effc066ef05e092760f38c35a2426d9c44c64b85d60d53e
-
SHA512
7c020f91cb6dffc85d656b5db3a889d3cd29c5c6add5a2432b8e9710f10d182ebae391365b433f325355802151a936c7daadcbd8a44e7b0a445c175ea3c93d55
Score7/10-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-