General
-
Target
tr_3.xls
-
Size
90KB
-
Sample
200714-1q1934z7la
-
MD5
5ca92721e11bdf5639bb4b318a21306e
-
SHA1
18dfa536f2c91664c502f2bf651aa07ce2189668
-
SHA256
0eb8945c373c97dc92daf2606d48ba5677b954110ee7b7a00b0d7b006a01fa03
-
SHA512
fd003ba7c0be78f493cd7a687e77b27c5cd102df0ca20e21edc5d9789a25830dc1160e0ea49e1fc9fb6ed87b48373fefce714b9dc3c26a932ffe11088fdd175c
Static task
static1
Behavioral task
behavioral1
Sample
tr_3.xls
Resource
win7
Malware Config
Targets
-
-
Target
tr_3.xls
-
Size
90KB
-
MD5
5ca92721e11bdf5639bb4b318a21306e
-
SHA1
18dfa536f2c91664c502f2bf651aa07ce2189668
-
SHA256
0eb8945c373c97dc92daf2606d48ba5677b954110ee7b7a00b0d7b006a01fa03
-
SHA512
fd003ba7c0be78f493cd7a687e77b27c5cd102df0ca20e21edc5d9789a25830dc1160e0ea49e1fc9fb6ed87b48373fefce714b9dc3c26a932ffe11088fdd175c
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Executes dropped EXE
-
Loads dropped DLL
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Process spawned suspicious child process
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
-
Suspicious use of SetThreadContext
-