General
-
Target
2b5e8601ebef2e9c3b82bfc71f4d9c60.jar
-
Size
200KB
-
Sample
201005-v3f4zxbrka
-
MD5
2b5e8601ebef2e9c3b82bfc71f4d9c60
-
SHA1
678237fe0071f9ee54c756d71f2e2fc655a27c60
-
SHA256
eec063e54c4eb818e568bde4f742efb075c691a9201d974291c6767bac7c20a1
-
SHA512
2db0e8586843c48a4cabfbac44d522f9ad94ec55c0d721b3faa5856a4d68e118105d5a3b3800ebe55b1b61913a24601595aa05de266099d19e3ee0656cc45a10
Static task
static1
Behavioral task
behavioral1
Sample
2b5e8601ebef2e9c3b82bfc71f4d9c60.jar
Resource
win7v200722
Behavioral task
behavioral2
Sample
2b5e8601ebef2e9c3b82bfc71f4d9c60.jar
Resource
win10v200722
Malware Config
Targets
-
-
Target
2b5e8601ebef2e9c3b82bfc71f4d9c60.jar
-
Size
200KB
-
MD5
2b5e8601ebef2e9c3b82bfc71f4d9c60
-
SHA1
678237fe0071f9ee54c756d71f2e2fc655a27c60
-
SHA256
eec063e54c4eb818e568bde4f742efb075c691a9201d974291c6767bac7c20a1
-
SHA512
2db0e8586843c48a4cabfbac44d522f9ad94ec55c0d721b3faa5856a4d68e118105d5a3b3800ebe55b1b61913a24601595aa05de266099d19e3ee0656cc45a10
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-