General
-
Target
1e20978faf83eef6a9d3f22dc7a2e17e.exe
-
Size
464KB
-
Sample
200731-x2cmxvenda
-
MD5
1e20978faf83eef6a9d3f22dc7a2e17e
-
SHA1
25c2f7e1e00cfaa7ca77d6e92329378af65cd41f
-
SHA256
3d8567fb3b55c792b8ba70e2172726ae80805f1a1c858db29e13a5cd02d8634a
-
SHA512
b209cbc0c64c38c57ad6c0b198c035332fb670c7d80c3ff3ac338b96eb7e779e32e3a7bf8e7ee307d1e05106e536eaf72f16d66d0678217a0bb4da0da973ba09
Static task
static1
Behavioral task
behavioral1
Sample
1e20978faf83eef6a9d3f22dc7a2e17e.exe
Resource
win7
Malware Config
Targets
-
-
Target
1e20978faf83eef6a9d3f22dc7a2e17e.exe
-
Size
464KB
-
MD5
1e20978faf83eef6a9d3f22dc7a2e17e
-
SHA1
25c2f7e1e00cfaa7ca77d6e92329378af65cd41f
-
SHA256
3d8567fb3b55c792b8ba70e2172726ae80805f1a1c858db29e13a5cd02d8634a
-
SHA512
b209cbc0c64c38c57ad6c0b198c035332fb670c7d80c3ff3ac338b96eb7e779e32e3a7bf8e7ee307d1e05106e536eaf72f16d66d0678217a0bb4da0da973ba09
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-