General
-
Target
https://drive.google.com/file/d/1_R6Ydn-j0KtxxxE7OY1l0qfTZnKOIDZM/view?usp=sharing
-
Sample
201030-nx42zm4z16
Static task
static1
URLScan task
urlscan1
Sample
https://drive.google.com/file/d/1_R6Ydn-j0KtxxxE7OY1l0qfTZnKOIDZM/view?usp=sharing
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1_R6Ydn-j0KtxxxE7OY1l0qfTZnKOIDZM/view?usp=sharing
Resource
win10v20201028
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\3884_1195681031\us_tv_and_film.txt
Extracted
C:\Users\Admin\AppData\Local\Temp\3884_1195681031\english_wikipedia.txt
https
http
Targets
-
-
Target
https://drive.google.com/file/d/1_R6Ydn-j0KtxxxE7OY1l0qfTZnKOIDZM/view?usp=sharing
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
JavaScript code in executable
-
Legitimate hosting services abused for malware hosting/C2
-