General
-
Target
Office2020.exe
-
Size
18.7MB
-
Sample
200711-ywxpkbpy66
-
MD5
90b700738a1ee565ef4143181e7f2ffe
-
SHA1
74ec2b894b1f9e91f234b085644a780c607dcbbb
-
SHA256
9a790275a349661ae3c6cd5dd50476cbb84febd492673f3724ccb152c5db45d1
-
SHA512
97200be701ab9f56d8bd697c6a4a59b3bb30ceb3e2ed42425e1ccc173ec810cad95494d1622a1ba2e307f93d6895ea1ccfb5a524b7ffd2ec63b04e148c361d94
Static task
static1
Behavioral task
behavioral1
Sample
Office2020.exe
Resource
win7
Behavioral task
behavioral2
Sample
Office2020.exe
Resource
win10v200430
Malware Config
Targets
-
-
Target
Office2020.exe
-
Size
18.7MB
-
MD5
90b700738a1ee565ef4143181e7f2ffe
-
SHA1
74ec2b894b1f9e91f234b085644a780c607dcbbb
-
SHA256
9a790275a349661ae3c6cd5dd50476cbb84febd492673f3724ccb152c5db45d1
-
SHA512
97200be701ab9f56d8bd697c6a4a59b3bb30ceb3e2ed42425e1ccc173ec810cad95494d1622a1ba2e307f93d6895ea1ccfb5a524b7ffd2ec63b04e148c361d94
Score7/10-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-