General
-
Target
4e07e19a75305cc86b8714e29695b0297b663627d55e108fad4560613e02cd32.exe
-
Size
1.1MB
-
Sample
200713-3nadzgzjs2
-
MD5
7f7c5cacc9352348efed2bd68321dae6
-
SHA1
a01fe5803a58bdb1f3095806433186efbfc6f409
-
SHA256
4e07e19a75305cc86b8714e29695b0297b663627d55e108fad4560613e02cd32
-
SHA512
5cd1662246f7c6f3b3107d710c0ff754ed8c7bacaf5b6115a3c87ac54c95dd5ea08973ca72a609582620928dda2ea43f3af4aaf8e7971dbbdd48c1ca2f44a234
Static task
static1
Behavioral task
behavioral1
Sample
4e07e19a75305cc86b8714e29695b0297b663627d55e108fad4560613e02cd32.exe
Resource
win7
Malware Config
Targets
-
-
Target
4e07e19a75305cc86b8714e29695b0297b663627d55e108fad4560613e02cd32.exe
-
Size
1.1MB
-
MD5
7f7c5cacc9352348efed2bd68321dae6
-
SHA1
a01fe5803a58bdb1f3095806433186efbfc6f409
-
SHA256
4e07e19a75305cc86b8714e29695b0297b663627d55e108fad4560613e02cd32
-
SHA512
5cd1662246f7c6f3b3107d710c0ff754ed8c7bacaf5b6115a3c87ac54c95dd5ea08973ca72a609582620928dda2ea43f3af4aaf8e7971dbbdd48c1ca2f44a234
-
Deletes itself
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency wallets, possible credential harvesting
-
Checks for installed software on the system
-