Analysis
-
max time kernel
126s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
17-07-2020 08:58
Static task
static1
Behavioral task
behavioral1
Sample
DataStealer from 1_2.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
General
-
Target
DataStealer from 1_2.exe
-
Size
1.2MB
-
MD5
7dba2e8ecbad5b33646e03a4af78967a
-
SHA1
f538fe80f76330e7d548e4f9b5171a56116d8e5e
-
SHA256
861878b319e66fd632f7d7623f0b56028f18d1e315680a15fc161a451ac9c788
-
SHA512
b6a5e07b0227a6acecfba1917de66099e42c69632333e49f75b4c8d8191cb268bea4c751be2afd763089ea205083a35cf6c2b8c15de02e3564a842d5c3d8d1c6
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1628 DataStealer from 1_2.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe 1628 DataStealer from 1_2.exe -
Echelon log file 1 IoCs
Detects a log file produced by Echelon.
yara_rule echelon_log_file -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com 3 api.ipify.org 4 api.ipify.org