General
-
Target
3ed6c63f4c06dbeedb1d49f943ee4215.jar
-
Size
437KB
-
Sample
200710-wsa7cvckdx
-
MD5
3ed6c63f4c06dbeedb1d49f943ee4215
-
SHA1
6ae2a4d5fa0a62203607dc339ceae9a7eb332abf
-
SHA256
b8eaca0905fc46ad6f69320954a0ec35fcd571fc829ed264a908c7aaa2b4eb92
-
SHA512
2af56f592554ab710b1f02b2390e5585be6f9723a79f2161a9323cfe9ea8739bf5d2b227c78570c1249f8fca9f7877674d2a133699709e21c072779a72713f34
Static task
static1
Behavioral task
behavioral1
Sample
3ed6c63f4c06dbeedb1d49f943ee4215.jar
Resource
win7
Behavioral task
behavioral2
Sample
3ed6c63f4c06dbeedb1d49f943ee4215.jar
Resource
win10v200430
Malware Config
Targets
-
-
Target
3ed6c63f4c06dbeedb1d49f943ee4215.jar
-
Size
437KB
-
MD5
3ed6c63f4c06dbeedb1d49f943ee4215
-
SHA1
6ae2a4d5fa0a62203607dc339ceae9a7eb332abf
-
SHA256
b8eaca0905fc46ad6f69320954a0ec35fcd571fc829ed264a908c7aaa2b4eb92
-
SHA512
2af56f592554ab710b1f02b2390e5585be6f9723a79f2161a9323cfe9ea8739bf5d2b227c78570c1249f8fca9f7877674d2a133699709e21c072779a72713f34
Score7/10-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-