General
-
Target
RFQ Request For Quotation.doc. .exe
-
Size
1.0MB
-
Sample
200709-wka4avlsbe
-
MD5
087a1ecc3d720b786d8cc8544bc469ed
-
SHA1
721623d6904a1c9e8168c3f104840490b5b52491
-
SHA256
dff0bf7c85f01cf94f21c7bdd224fe0b3d73dcad9cb38fa40eef4685c9bc63ab
-
SHA512
ae12605396dc568f7da9d9fdfb5518bcedea190c0c7f3d39d9773c76fee41bc5f0daf966ca31bba6acccdc5be867e64a30c6c1deed2425713db1226c196d5981
Static task
static1
Behavioral task
behavioral1
Sample
RFQ Request For Quotation.doc. .exe
Resource
win7
Behavioral task
behavioral2
Sample
RFQ Request For Quotation.doc. .exe
Resource
win10v200430
Malware Config
Extracted
Protocol: ftp- Host:
ftps4.us.freehostia.com - Port:
21 - Username:
jumshi - Password:
winniebobo
Targets
-
-
Target
RFQ Request For Quotation.doc. .exe
-
Size
1.0MB
-
MD5
087a1ecc3d720b786d8cc8544bc469ed
-
SHA1
721623d6904a1c9e8168c3f104840490b5b52491
-
SHA256
dff0bf7c85f01cf94f21c7bdd224fe0b3d73dcad9cb38fa40eef4685c9bc63ab
-
SHA512
ae12605396dc568f7da9d9fdfb5518bcedea190c0c7f3d39d9773c76fee41bc5f0daf966ca31bba6acccdc5be867e64a30c6c1deed2425713db1226c196d5981
Score10/10-
Executes dropped EXE
-
Modifies Windows Firewall
-
Stops running service(s)
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service
-