General
-
Target
PO#54777587657864.bat
-
Size
552KB
-
Sample
200712-tknpnph1dn
-
MD5
91d19d78b995cb707d82b22825351174
-
SHA1
466c85478cbaac4e0f13cabcb042fce4476b518c
-
SHA256
85e27a1781cf4c5207506a5c2a7df47ab4b79186ffeb2fa6665fb4c2bd50f261
-
SHA512
c919d0d0055e5777af728859488a74872024538231d180c8b24c8ca08af30f2faf34475ad16901191aa5cee5e6df50520d862fd526e81656b35a47e717faa3be
Static task
static1
Behavioral task
behavioral1
Sample
PO#54777587657864.bat.exe
Resource
win7
Behavioral task
behavioral2
Sample
PO#54777587657864.bat.exe
Resource
win10v200430
Malware Config
Targets
-
-
Target
PO#54777587657864.bat
-
Size
552KB
-
MD5
91d19d78b995cb707d82b22825351174
-
SHA1
466c85478cbaac4e0f13cabcb042fce4476b518c
-
SHA256
85e27a1781cf4c5207506a5c2a7df47ab4b79186ffeb2fa6665fb4c2bd50f261
-
SHA512
c919d0d0055e5777af728859488a74872024538231d180c8b24c8ca08af30f2faf34475ad16901191aa5cee5e6df50520d862fd526e81656b35a47e717faa3be
Score7/10-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-
Suspicious use of SetThreadContext
-