General
-
Target
INV10072020PO67487.exe
-
Size
416KB
-
Sample
200710-agphekvw6a
-
MD5
83ab076e21939b242d02b1c1b89e3097
-
SHA1
e278bd2d4d9b1e5fc55b448aa4e42506a3e47574
-
SHA256
8d9b4ac8385e86b7a40756c1c3d5cb1a7e84cffbb43e242438f8e60ec48e092b
-
SHA512
fef69363cdf8b3c30e1bf0cb992558ee77d2f1326d842768fb20f5c2fff4a14e9def0434965bacf9fd82cb908a342e0fa5af5c5ab9d715899ed734510a5a01fd
Static task
static1
Behavioral task
behavioral1
Sample
INV10072020PO67487.exe
Resource
win7
Behavioral task
behavioral2
Sample
INV10072020PO67487.exe
Resource
win10
Malware Config
Targets
-
-
Target
INV10072020PO67487.exe
-
Size
416KB
-
MD5
83ab076e21939b242d02b1c1b89e3097
-
SHA1
e278bd2d4d9b1e5fc55b448aa4e42506a3e47574
-
SHA256
8d9b4ac8385e86b7a40756c1c3d5cb1a7e84cffbb43e242438f8e60ec48e092b
-
SHA512
fef69363cdf8b3c30e1bf0cb992558ee77d2f1326d842768fb20f5c2fff4a14e9def0434965bacf9fd82cb908a342e0fa5af5c5ab9d715899ed734510a5a01fd
Score7/10-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-