General
-
Target
5e46a1a48700186e46692a36167a56ab.exe
-
Size
457KB
-
Sample
200712-gexl9a61se
-
MD5
5e46a1a48700186e46692a36167a56ab
-
SHA1
7880f3487fd0450f205e314061a15c7a8da827b5
-
SHA256
380cc04bea579540eaa9e5a2b4e89b6696736c02f1602dd51e5ebddf01e9e5da
-
SHA512
4a83735e707694db2b9c010cb26330d5d737df45984701b7f4a6d891aaee7e6750b9b283bfb8bf06fc3e7a6e3cb9373f20e9ca5b43116f9fda1448350fc22485
Static task
static1
Behavioral task
behavioral1
Sample
5e46a1a48700186e46692a36167a56ab.exe
Resource
win7
Malware Config
Targets
-
-
Target
5e46a1a48700186e46692a36167a56ab.exe
-
Size
457KB
-
MD5
5e46a1a48700186e46692a36167a56ab
-
SHA1
7880f3487fd0450f205e314061a15c7a8da827b5
-
SHA256
380cc04bea579540eaa9e5a2b4e89b6696736c02f1602dd51e5ebddf01e9e5da
-
SHA512
4a83735e707694db2b9c010cb26330d5d737df45984701b7f4a6d891aaee7e6750b9b283bfb8bf06fc3e7a6e3cb9373f20e9ca5b43116f9fda1448350fc22485
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-