General
-
Target
po30 URGENT QUOTE NEEDED FOR 9th JULY 2020.exe
-
Size
646KB
-
Sample
200712-4jzn9tf662
-
MD5
4cb1b5c688395f40d9eb8e8f2ad6c1fb
-
SHA1
718051b56921d6a85024afb8357e6b06e38356e8
-
SHA256
e3fc20c3720e3822c54c48f53cffb77b3a21769eb9c03c63fe7fb032d7181bfa
-
SHA512
bbe1a416cee69d17c376aff7b5379cba92a0c9d077a026704a121993af7540491869ab37f88a90e90947a6fde8221c67a5f5703ffc4319190eeab814ad764b8b
Static task
static1
Behavioral task
behavioral1
Sample
po30 URGENT QUOTE NEEDED FOR 9th JULY 2020.exe
Resource
win7
Behavioral task
behavioral2
Sample
po30 URGENT QUOTE NEEDED FOR 9th JULY 2020.exe
Resource
win10
Malware Config
Targets
-
-
Target
po30 URGENT QUOTE NEEDED FOR 9th JULY 2020.exe
-
Size
646KB
-
MD5
4cb1b5c688395f40d9eb8e8f2ad6c1fb
-
SHA1
718051b56921d6a85024afb8357e6b06e38356e8
-
SHA256
e3fc20c3720e3822c54c48f53cffb77b3a21769eb9c03c63fe7fb032d7181bfa
-
SHA512
bbe1a416cee69d17c376aff7b5379cba92a0c9d077a026704a121993af7540491869ab37f88a90e90947a6fde8221c67a5f5703ffc4319190eeab814ad764b8b
Score7/10-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-