General
-
Target
460a1s0ssssd7da.exe
-
Size
717KB
-
Sample
200709-dbqrwjwtvn
-
MD5
a8569bc863ee5c29671bbac230ee8d90
-
SHA1
ece5c2505319d3abe8bb081f325c4a42f61dd6db
-
SHA256
c35b8114cf20d7683905224a84263fdff99577ce69a1b1a94e66f525c38f31ce
-
SHA512
5a510640357931044bc471cd5664b91869ba405682d7847e9fb7081a865ccd6b9a37bb022e5c92e9616002029ae9c29a46aec7ff0e9d14160ce758146c717205
Static task
static1
Behavioral task
behavioral1
Sample
460a1s0ssssd7da.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
460a1s0ssssd7da.exe
Resource
win10
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\Read_Me.txt
http://7rzpyw3hflwe2c7h.onion/?QQQQQQQQ
http://helpqvrg3cc5mvb3.onion/
Extracted
\??\M:\Read_Me.txt
http://7rzpyw3hflwe2c7h.onion/?CUVXYACD
http://helpqvrg3cc5mvb3.onion/
Targets
-
-
Target
460a1s0ssssd7da.exe
-
Size
717KB
-
MD5
a8569bc863ee5c29671bbac230ee8d90
-
SHA1
ece5c2505319d3abe8bb081f325c4a42f61dd6db
-
SHA256
c35b8114cf20d7683905224a84263fdff99577ce69a1b1a94e66f525c38f31ce
-
SHA512
5a510640357931044bc471cd5664b91869ba405682d7847e9fb7081a865ccd6b9a37bb022e5c92e9616002029ae9c29a46aec7ff0e9d14160ce758146c717205
Score10/10-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
-
Suspicious use of SetThreadContext
-