General
-
Target
pewpew_p.bin.zip
-
Size
1.0MB
-
Sample
200922-vpaskbkcsa
-
MD5
3f8bf33a6b177c777c6d194aab965827
-
SHA1
cde28ce94fb3525ce78e2415e13d015f89809a9c
-
SHA256
b24138773df4528b653442a1640a3f480a3172015c6fe1997979d5a52a85e8dd
-
SHA512
3a042b18dde83b5787f817a6331d3d08af6d00d469e362ed5ae2a67713255fe72b3574dc7473fe5dce7c690c09559b10d2679b3f6f2881453ea60c01725def46
Static task
static1
Behavioral task
behavioral1
Sample
pewpew_p.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
pewpew_p.bin.exe
Resource
win10v200722
Malware Config
Extracted
C:\info-decrypt.txt
Extracted
C:\info-decrypt.txt
Targets
-
-
Target
pewpew_p.bin
-
Size
1.0MB
-
MD5
202bf9be9a4e45526e482f08104717ad
-
SHA1
1e5bbfb9167150935c6eb25bbbebbe5c77a97aa2
-
SHA256
7282df1360af4c028930ffd9fbc30ea9d17f08f14b725f8020677dd9df961c55
-
SHA512
89db20536030f28af5997d4b93e90ead0ccd7299d6777d422159a0a41b658274743a390fed1a9f942b668f4f04afd1119e7b4a41356b10ea37393c8b5e05f5ea
Score10/10-
Modifies Windows Firewall
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s)
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies service
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-