General
-
Target
023abdf2337367286dfacb24c1083b7f.jar
-
Size
278KB
-
Sample
201005-ve5xetcwcn
-
MD5
023abdf2337367286dfacb24c1083b7f
-
SHA1
c2d901942b56d9f416e60f4a5e016b3cde322aba
-
SHA256
b6b41f00daa713f98a2d89aae60de306688576cfe7e9186eb0d8e4821a6800b6
-
SHA512
5e26091512925b28909b01c7aaabdd63f0c1f7a39461b5f450f2389dc4d6e26dc3e3d920035dccf10487afb8ad1ff6f99b272b5210be1a533ed56749c8e5a1e7
Static task
static1
Behavioral task
behavioral1
Sample
023abdf2337367286dfacb24c1083b7f.jar
Resource
win7
Behavioral task
behavioral2
Sample
023abdf2337367286dfacb24c1083b7f.jar
Resource
win10
Malware Config
Targets
-
-
Target
023abdf2337367286dfacb24c1083b7f.jar
-
Size
278KB
-
MD5
023abdf2337367286dfacb24c1083b7f
-
SHA1
c2d901942b56d9f416e60f4a5e016b3cde322aba
-
SHA256
b6b41f00daa713f98a2d89aae60de306688576cfe7e9186eb0d8e4821a6800b6
-
SHA512
5e26091512925b28909b01c7aaabdd63f0c1f7a39461b5f450f2389dc4d6e26dc3e3d920035dccf10487afb8ad1ff6f99b272b5210be1a533ed56749c8e5a1e7
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-