General
-
Target
904a1s0ssssd7da.exe
-
Size
717KB
-
Sample
200709-vm3bfxexta
-
MD5
d1219f162fe099a078395b92d1249732
-
SHA1
6150ff828305f7ca1381e19430afb1e79a96a1aa
-
SHA256
bb48fbcf365f8a493866cba9818c84614cfc6a9877a6e30e2f7cb445253be1d9
-
SHA512
d49db29169c146ad55220f8c7455ca5ea74f23ad209deca423a744b9aef3290df97d169b76b829b40d468ccd095e35374f1cfbf3997a7853b3377341e02e8ca5
Static task
static1
Behavioral task
behavioral1
Sample
904a1s0ssssd7da.exe
Resource
win7
Behavioral task
behavioral2
Sample
904a1s0ssssd7da.exe
Resource
win10
Malware Config
Extracted
\??\M:\Boot\cs-CZ\Read_Me.txt
http://7rzpyw3hflwe2c7h.onion/?KKLLLLLL
http://helpqvrg3cc5mvb3.onion/
Extracted
C:\Boot\bg-BG\Read_Me.txt
http://7rzpyw3hflwe2c7h.onion/?OFRIKLXP
http://helpqvrg3cc5mvb3.onion/
Targets
-
-
Target
904a1s0ssssd7da.exe
-
Size
717KB
-
MD5
d1219f162fe099a078395b92d1249732
-
SHA1
6150ff828305f7ca1381e19430afb1e79a96a1aa
-
SHA256
bb48fbcf365f8a493866cba9818c84614cfc6a9877a6e30e2f7cb445253be1d9
-
SHA512
d49db29169c146ad55220f8c7455ca5ea74f23ad209deca423a744b9aef3290df97d169b76b829b40d468ccd095e35374f1cfbf3997a7853b3377341e02e8ca5
Score10/10-
Modifies Installed Components in the registry
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s)
-
Enumerates connected drives
-
Modifies service
-
Suspicious use of SetThreadContext
-