General
-
Target
09002c686e358799a9d732f4483a31a858bb140a3dfd59df54b1d449d2f8122b.zip
-
Size
32KB
-
Sample
201105-373btldwxn
-
MD5
1c6c353303a96f52f5db94728023b5ec
-
SHA1
3161c778e3f75894726fca04e59644a5148cc270
-
SHA256
dca8a7b08395e6c8cec2e5526f7b2ac3110c68bd047a2df85307387b9657373b
-
SHA512
053ac23e05ba0e8c027ddb4fa62787868c3b9cb8052c7b07392b5f8587cd8da485f0b359f9dc51ff98af8ee1f3638bbb5b3541e8f749b1ec3b7a877c12b21132
Static task
static1
Behavioral task
behavioral1
Sample
09002c686e358799a9d732f4483a31a858bb140a3dfd59df54b1d449d2f8122b.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
09002c686e358799a9d732f4483a31a858bb140a3dfd59df54b1d449d2f8122b
-
Size
34KB
-
MD5
ca56f256dfb3ad7ee41179cf20ed9e3b
-
SHA1
b9aec780c86538f32bdfdaf39b4d2a77e4a4dced
-
SHA256
09002c686e358799a9d732f4483a31a858bb140a3dfd59df54b1d449d2f8122b
-
SHA512
b56cfcd0ffea6b96bdffeb5023365f6fc762cadfce6d7bb32f4d782fd47e03f744a5d98912f183505f20a8cb3bae54eb91930dfbf0e47fb65523653e6c95a91b
-
Deletes itself
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-