General
-
Target
PURCHASE ORDER.exe
-
Size
534KB
-
Sample
200716-jcjstct1re
-
MD5
30a88aaca2412bcc3914382dce41ae1a
-
SHA1
4abbc932878a42eec7a438fc383370e83ea43d7e
-
SHA256
57234a3ec3bf2d3e6539a25221595d791fcf68dbed39a942651819c74fc3c664
-
SHA512
8db262de282eaa5471963eae4f08729b21728cf783184d819221fba6283153817aa71f8a7f22f0d6ee24bd123fd2b9dfea9fb20c46db1a62710ebdaab3958b94
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER.exe
Resource
win7
Behavioral task
behavioral2
Sample
PURCHASE ORDER.exe
Resource
win10v200430
Malware Config
Targets
-
-
Target
PURCHASE ORDER.exe
-
Size
534KB
-
MD5
30a88aaca2412bcc3914382dce41ae1a
-
SHA1
4abbc932878a42eec7a438fc383370e83ea43d7e
-
SHA256
57234a3ec3bf2d3e6539a25221595d791fcf68dbed39a942651819c74fc3c664
-
SHA512
8db262de282eaa5471963eae4f08729b21728cf783184d819221fba6283153817aa71f8a7f22f0d6ee24bd123fd2b9dfea9fb20c46db1a62710ebdaab3958b94
-
Adds policy Run key to start application
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-