General
-
Target
Bankbezahlung.exe
-
Size
573KB
-
Sample
200708-mpnwb2z7js
-
MD5
f719210283f21205a9b5fac30a6a9606
-
SHA1
24fe6f43e12de363571a3f3f24bf0cb850c1f384
-
SHA256
26662ea8f2ceaeb815e62f5fcf388b95a782f6856dc7c743c1cf698681ba9dc4
-
SHA512
2a8fcd1f2bdb9258ebef2d2528785e5b8f64cf0c8b69c2ff9245a3705a2f8f07b02ec9826f14cf07aace2498e2fa2e6bcf19377721825c5ae981087c197682e5
Static task
static1
Behavioral task
behavioral1
Sample
Bankbezahlung.exe
Resource
win7
Malware Config
Targets
-
-
Target
Bankbezahlung.exe
-
Size
573KB
-
MD5
f719210283f21205a9b5fac30a6a9606
-
SHA1
24fe6f43e12de363571a3f3f24bf0cb850c1f384
-
SHA256
26662ea8f2ceaeb815e62f5fcf388b95a782f6856dc7c743c1cf698681ba9dc4
-
SHA512
2a8fcd1f2bdb9258ebef2d2528785e5b8f64cf0c8b69c2ff9245a3705a2f8f07b02ec9826f14cf07aace2498e2fa2e6bcf19377721825c5ae981087c197682e5
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Uses the VBS compiler for execution
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-