General
-
Target
machine.dll
-
Size
46KB
-
Sample
201002-l8t1qmee92
-
MD5
f66ff9ac0e1dc028de92aaa3255daf81
-
SHA1
5455fadda6480468034eb65a0e58afff69a63aba
-
SHA256
88c3ec0d56ce1c6ea8763ced6993e704e73b3fd105f40a142bc310fcd6efc77d
-
SHA512
2d1fdae8b67aa8f3180a8ed347315053b09b20fa2bf90738af39b32a47fb2d5dc84c61d187e61566e826a6d05f9a80346f6a02c581b04c6d808dc7bb65bf8294
Static task
static1
Behavioral task
behavioral1
Sample
machine.dll
Resource
win7v200722
Malware Config
Targets
-
-
Target
machine.dll
-
Size
46KB
-
MD5
f66ff9ac0e1dc028de92aaa3255daf81
-
SHA1
5455fadda6480468034eb65a0e58afff69a63aba
-
SHA256
88c3ec0d56ce1c6ea8763ced6993e704e73b3fd105f40a142bc310fcd6efc77d
-
SHA512
2d1fdae8b67aa8f3180a8ed347315053b09b20fa2bf90738af39b32a47fb2d5dc84c61d187e61566e826a6d05f9a80346f6a02c581b04c6d808dc7bb65bf8294
-
ServiceHost packer
Detects ServiceHost packer used for .NET malware
-
Deletes itself
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-