Analysis
-
max time kernel
36s -
max time network
37s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
30-10-2020 18:12
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Trojan.Packed2.42600.30573.20195.exe
Resource
win7v20201028
General
-
Target
SecuriteInfo.com.Trojan.Packed2.42600.30573.20195.exe
-
Size
267KB
-
MD5
9ada122303e6dee1c0f0171bf2e59253
-
SHA1
b9f2cac95510c1199083504e0ae57fd14bf559d5
-
SHA256
b3cfbb058c0ecbd7da7f5bdd740fa729f7b0d9cf61f93b32750ce06745abc24c
-
SHA512
f7ac9d8f6b1ff6c66a30b116d07860819c9db46b4cf08567f0db3d171752d36ab38a490fefa28dfb0ac51203fb6f26d2c226bbfed39c68275015f652963f0c8f
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 6 api.ipify.org -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
SecuriteInfo.com.Trojan.Packed2.42600.30573.20195.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SecuriteInfo.com.Trojan.Packed2.42600.30573.20195.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SecuriteInfo.com.Trojan.Packed2.42600.30573.20195.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
SecuriteInfo.com.Trojan.Packed2.42600.30573.20195.exepid process 344 SecuriteInfo.com.Trojan.Packed2.42600.30573.20195.exe