General
-
Target
Booking Confirmation 110420203251 - copy - PDF.exe
-
Size
344KB
-
Sample
201105-8lhrre6d56
-
MD5
f4f48519f108900933d0dd0e8aa1f40f
-
SHA1
5a48020b486ab74eea85cf88d647dc2ba0994ace
-
SHA256
f6d2fe1a8ba40429708ec5c70159fcff0e9741ea260ea93e3665d6ea752f96d3
-
SHA512
d02dc186871c344bddac7ae1a5c1e9c72014e106dfdbe1c565bf7a56ae052b10f7abb69f34010f5315752766bc40a86d1f9e20da2c8c70f7c0aef053ab3248a1
Static task
static1
Behavioral task
behavioral1
Sample
Booking Confirmation 110420203251 - copy - PDF.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
Booking Confirmation 110420203251 - copy - PDF.exe
-
Size
344KB
-
MD5
f4f48519f108900933d0dd0e8aa1f40f
-
SHA1
5a48020b486ab74eea85cf88d647dc2ba0994ace
-
SHA256
f6d2fe1a8ba40429708ec5c70159fcff0e9741ea260ea93e3665d6ea752f96d3
-
SHA512
d02dc186871c344bddac7ae1a5c1e9c72014e106dfdbe1c565bf7a56ae052b10f7abb69f34010f5315752766bc40a86d1f9e20da2c8c70f7c0aef053ab3248a1
-
Beds Protector Packer
Detects Beds Protector packer used to load .NET malware.
-
HiveRAT Payload
-
Drops startup file
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext
-