General
-
Target
Repter.exe
-
Size
436KB
-
Sample
200712-epzchx1p2a
-
MD5
784d27170c1761184cef189fa4889cc6
-
SHA1
625dfcece6874d9bfd81020004c648e15588e518
-
SHA256
5ef2a211e48b408b0e5c9dfac30683e8f7eb83231c11e25c01368b0ef1868ea1
-
SHA512
c4696ce309e5986344d372289830645099c70021d7e2e7bbdc4ff6192e369e9b29604773f065f9cf284d61bc2979a98136bdbb3c3eb1caf6c44b5baa68319d08
Static task
static1
Behavioral task
behavioral1
Sample
Repter.exe
Resource
win7
Behavioral task
behavioral2
Sample
Repter.exe
Resource
win10v200430
Malware Config
Extracted
C:\Users\Admin\Desktop\How To Decrypt Files.hta
repter@tuta.io
Repter@elude.in
Targets
-
-
Target
Repter.exe
-
Size
436KB
-
MD5
784d27170c1761184cef189fa4889cc6
-
SHA1
625dfcece6874d9bfd81020004c648e15588e518
-
SHA256
5ef2a211e48b408b0e5c9dfac30683e8f7eb83231c11e25c01368b0ef1868ea1
-
SHA512
c4696ce309e5986344d372289830645099c70021d7e2e7bbdc4ff6192e369e9b29604773f065f9cf284d61bc2979a98136bdbb3c3eb1caf6c44b5baa68319d08
Score10/10-
Disables Task Manager via registry modification
-
Modifies Installed Components in the registry
-
Drops startup file
-
Modifies file permissions
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-