General
-
Target
e50d52fbac295a37f0ed0b724d4ddafca8c86bcd2391b4c481d51d5e279afd20
-
Size
4.6MB
-
Sample
200713-a751hw8tr6
-
MD5
ea8531d407c28f4ef6d2ef5bc9b41ff8
-
SHA1
4f3d19c9be52aa58c338bfec0db33dc07f957521
-
SHA256
e50d52fbac295a37f0ed0b724d4ddafca8c86bcd2391b4c481d51d5e279afd20
-
SHA512
8e09cf0e2d70b2e9bc2515e36725560db0bef688931c73df457739e46f835cea01a18b76035e94d8571be88055c520151f90aabf067d61467c99dab1e494d3ce
Static task
static1
Behavioral task
behavioral1
Sample
e50d52fbac295a37f0ed0b724d4ddafca8c86bcd2391b4c481d51d5e279afd20.exe
Resource
win7
Behavioral task
behavioral2
Sample
e50d52fbac295a37f0ed0b724d4ddafca8c86bcd2391b4c481d51d5e279afd20.exe
Resource
win10v200430
Malware Config
Extracted
C:\MSOCache\All Users\{90140000-0011-0000-1000-0000000FF1CE}-C\HOW TO RESTORE YOUR FILES.TXT
Targets
-
-
Target
e50d52fbac295a37f0ed0b724d4ddafca8c86bcd2391b4c481d51d5e279afd20
-
Size
4.6MB
-
MD5
ea8531d407c28f4ef6d2ef5bc9b41ff8
-
SHA1
4f3d19c9be52aa58c338bfec0db33dc07f957521
-
SHA256
e50d52fbac295a37f0ed0b724d4ddafca8c86bcd2391b4c481d51d5e279afd20
-
SHA512
8e09cf0e2d70b2e9bc2515e36725560db0bef688931c73df457739e46f835cea01a18b76035e94d8571be88055c520151f90aabf067d61467c99dab1e494d3ce
Score10/10-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Modifies service
-