General
-
Target
fin_bsc_report.jar
-
Size
73KB
-
Sample
201019-nec5t7r36n
-
MD5
7447f61327acef94cbdaaaacdc5f7f2d
-
SHA1
d831ded9fc308cc53be80d819d33128392fcf962
-
SHA256
47f862b9d75a9190696a0620efddfe7e43b16b79c0b0f009a55ed5360f35b312
-
SHA512
0f4264a0335589b23e1c1a65f6bcbec24d5c4266e5d5d851fa2ad6990300618c7fa4e44ec957e095a9629c6d95175883636d7e7188297387ca21c25372cf8146
Static task
static1
Behavioral task
behavioral1
Sample
fin_bsc_report.jar
Resource
win7
Behavioral task
behavioral2
Sample
fin_bsc_report.jar
Resource
win10
Malware Config
Targets
-
-
Target
fin_bsc_report.jar
-
Size
73KB
-
MD5
7447f61327acef94cbdaaaacdc5f7f2d
-
SHA1
d831ded9fc308cc53be80d819d33128392fcf962
-
SHA256
47f862b9d75a9190696a0620efddfe7e43b16b79c0b0f009a55ed5360f35b312
-
SHA512
0f4264a0335589b23e1c1a65f6bcbec24d5c4266e5d5d851fa2ad6990300618c7fa4e44ec957e095a9629c6d95175883636d7e7188297387ca21c25372cf8146
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
JavaScript code in executable
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-