General
-
Target
BL Draft Copy shipping Documents .exe
-
Size
325KB
-
Sample
200713-12jmwa6wk6
-
MD5
0299adcd27d62af62ef8342bd71e205e
-
SHA1
de7978bf877f57671cb65b25aa29d9e780fbc67a
-
SHA256
9a53f9cbf04e13a0df2cfa0869356a9772ef9bb92a87303661c27031f682bd10
-
SHA512
3d97e0f73d52e1a1e92d8ad576e05fff411a1ee3d18577dfd045b2108147528e7cb3ad5764afc37e6fd10229e39ff5c9e5060d113f57b79e8181292343209c6e
Static task
static1
Behavioral task
behavioral1
Sample
BL Draft Copy shipping Documents .exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
BL Draft Copy shipping Documents .exe
Resource
win10
Malware Config
Targets
-
-
Target
BL Draft Copy shipping Documents .exe
-
Size
325KB
-
MD5
0299adcd27d62af62ef8342bd71e205e
-
SHA1
de7978bf877f57671cb65b25aa29d9e780fbc67a
-
SHA256
9a53f9cbf04e13a0df2cfa0869356a9772ef9bb92a87303661c27031f682bd10
-
SHA512
3d97e0f73d52e1a1e92d8ad576e05fff411a1ee3d18577dfd045b2108147528e7cb3ad5764afc37e6fd10229e39ff5c9e5060d113f57b79e8181292343209c6e
Score7/10-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-