General
-
Target
AVTK_Win_Sybari.exe
-
Size
62KB
-
Sample
200709-fvq2m94xjs
-
MD5
d5edd6b32296d1cee4829fb1499c8759
-
SHA1
b7f33bd8aeb6cdd59cbf88802938c6efc0108829
-
SHA256
b99e0b750b3815fec3b292ede3f94524c8bede7d158334295e096518e9cde0ad
-
SHA512
8f320e8461691572dbe21f7ae4d96f067e4d2fb228de8c9b3be5325d43905d637438fd5aaed14e603ef73bb79b47d20e650dfb4b27dad74140a703a629884bf5
Static task
static1
Behavioral task
behavioral1
Sample
AVTK_Win_Sybari.exe
Resource
win10
Malware Config
Extracted
C:\Users\Admin\Desktop\HELP_ME_RECOVER_MY_FILES.txt
hakbit
Targets
-
-
Target
AVTK_Win_Sybari.exe
-
Size
62KB
-
MD5
d5edd6b32296d1cee4829fb1499c8759
-
SHA1
b7f33bd8aeb6cdd59cbf88802938c6efc0108829
-
SHA256
b99e0b750b3815fec3b292ede3f94524c8bede7d158334295e096518e9cde0ad
-
SHA512
8f320e8461691572dbe21f7ae4d96f067e4d2fb228de8c9b3be5325d43905d637438fd5aaed14e603ef73bb79b47d20e650dfb4b27dad74140a703a629884bf5
Score10/10-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service
-