General
-
Target
plugx1.zip
-
Size
28KB
-
Sample
200713-r6v9yrjpve
-
MD5
9afd2aad1a8cc491b118ccaf019be412
-
SHA1
8951f86a7a4d82bf9dd382256a72f5c41403427b
-
SHA256
9bd31a3fe86402deb4093397011f9b3eea295f77eeb0ffd5cd27ded039e18468
-
SHA512
26907246b813b5908f87d99d95f7198c16a586441e944c81ed96dfd32763cacf309c47f5525891fd76eba931a459366d701d84624389fde4680df0e756acf657
Static task
static1
Behavioral task
behavioral1
Sample
5614bd0a2e2c2ca4194e99e2f848535fa9a16157bd78cae268cf2b3eda6e54c2.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
5614bd0a2e2c2ca4194e99e2f848535fa9a16157bd78cae268cf2b3eda6e54c2.exe
Resource
win10
Malware Config
Targets
-
-
Target
5614bd0a2e2c2ca4194e99e2f848535fa9a16157bd78cae268cf2b3eda6e54c2.exe
-
Size
77KB
-
MD5
de2147bd349bd429db6ed0149736465e
-
SHA1
b386fab1ca019046c87fbda87be360ba276defd6
-
SHA256
5614bd0a2e2c2ca4194e99e2f848535fa9a16157bd78cae268cf2b3eda6e54c2
-
SHA512
44087c162fb48a05766c893e1ba64f9c2df28ff0bb8951287af517420f0bae5aa362e1a3ed89cda1b73900bd2ce8a4f9f3a14f5e74d8392de361f007647fa76a
Score8/10-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-