General
-
Target
dbbfe15516215d810689645a799f406a9cfe0cb0ab19aa0b073383091aac466a
-
Size
1.4MB
-
Sample
200713-fdgjw5snf6
-
MD5
a1d72456dfc81cd15cbd2ac3a015b34b
-
SHA1
3807a91078dd020ba23d8cf79c2e4e236e35daa5
-
SHA256
dbbfe15516215d810689645a799f406a9cfe0cb0ab19aa0b073383091aac466a
-
SHA512
58a511d71c6a07eb95b06536098ea5dbdb9bc254e2b80b436f4a7591453d09e7674616ef56c9689ce257f204b9ae886fe3ae518ebdae40587f004c16d48e20cf
Static task
static1
Behavioral task
behavioral1
Sample
dbbfe15516215d810689645a799f406a9cfe0cb0ab19aa0b073383091aac466a.exe
Resource
win10
Malware Config
Targets
-
-
Target
dbbfe15516215d810689645a799f406a9cfe0cb0ab19aa0b073383091aac466a
-
Size
1.4MB
-
MD5
a1d72456dfc81cd15cbd2ac3a015b34b
-
SHA1
3807a91078dd020ba23d8cf79c2e4e236e35daa5
-
SHA256
dbbfe15516215d810689645a799f406a9cfe0cb0ab19aa0b073383091aac466a
-
SHA512
58a511d71c6a07eb95b06536098ea5dbdb9bc254e2b80b436f4a7591453d09e7674616ef56c9689ce257f204b9ae886fe3ae518ebdae40587f004c16d48e20cf
Score7/10-
Drops startup file
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-