General
-
Target
cd49c58defedd1594ad6c93c1019385e171e10bede1995eecd74540debfd942c.zip
-
Size
1014KB
-
Sample
200917-esb8zrlkza
-
MD5
a0b07cf5d38703f6ae96afb8e2d10ae4
-
SHA1
729c0cdef11f120bbd58c8ce5123151a0be7ead5
-
SHA256
9fdff0a10462045e31f33513b7cdbc43ff423709b7b6ac12555de40af498ffb6
-
SHA512
286a08fef15025a0d34a270679849fbe2c4c560b3dde994539b4404b102efbb0a8c01b3ec8fa4b4e92d4181696d7eb0bc8969bca059a37a0e085ed27aa109d73
Static task
static1
Behavioral task
behavioral1
Sample
cd49c58defedd1594ad6c93c1019385e171e10bede1995eecd74540debfd942c.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
cd49c58defedd1594ad6c93c1019385e171e10bede1995eecd74540debfd942c.exe
Resource
win10v200722
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\HACKED.txt
smaug
http://smaugrwmaystthfxp72tlmdbrzlwdp2pxtpvtzvhkv5ppg3difiwonad.onion
https://paxful.com/
https://changelly.com/
https://www.bitcoindepot.com/
Targets
-
-
Target
cd49c58defedd1594ad6c93c1019385e171e10bede1995eecd74540debfd942c.exe
-
Size
2.4MB
-
MD5
a239735cddd49236ae3562d43d83a8e4
-
SHA1
35bad8d66c79af9dabdcdd8dcebfc0440efc42a1
-
SHA256
cd49c58defedd1594ad6c93c1019385e171e10bede1995eecd74540debfd942c
-
SHA512
34bbfc20d82c4227f9e745f0f7cdb5ce68c684a4a84cde0340fa82601f9340fcb7d21c6060564be8580dcba8c3d1b5a16b28ab6964508e0d1ab994b59a818fef
Score10/10-
Drops file in Drivers directory
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory
-