General
-
Target
jooyu.exe
-
Size
3.6MB
-
Sample
200709-yndtx19eps
-
MD5
37d5c635f8d3299b0a83c0e4c372716c
-
SHA1
161e81a01668f556a41a1c3e1a301c734c784c08
-
SHA256
c25c1698395a2edd315158035660df240ab7e5cd43288fa87f207e07eec82d56
-
SHA512
18bf1be4b4c527e27452b71c34977f8f303a767a220640d8f134e9ef3fd8692307fbaa3931fbddf427ab33275bfaedac5cb471a12c4c74d35a725e7548727268
Static task
static1
Behavioral task
behavioral1
Sample
jooyu.exe
Resource
win7
Behavioral task
behavioral2
Sample
jooyu.exe
Resource
win10v200430
Malware Config
Targets
-
-
Target
jooyu.exe
-
Size
3.6MB
-
MD5
37d5c635f8d3299b0a83c0e4c372716c
-
SHA1
161e81a01668f556a41a1c3e1a301c734c784c08
-
SHA256
c25c1698395a2edd315158035660df240ab7e5cd43288fa87f207e07eec82d56
-
SHA512
18bf1be4b4c527e27452b71c34977f8f303a767a220640d8f134e9ef3fd8692307fbaa3931fbddf427ab33275bfaedac5cb471a12c4c74d35a725e7548727268
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-