General
-
Target
50ed87aac6767a2650e54b96f1c7d7be08ae652f9dda30253a271fae1f0811cd
-
Size
1.1MB
-
Sample
201106-qa1mkxr2ce
-
MD5
d15f9783772ea30b93ea65e5ebc27895
-
SHA1
e591de1936ef9bb12a7301628899013f408724ae
-
SHA256
50ed87aac6767a2650e54b96f1c7d7be08ae652f9dda30253a271fae1f0811cd
-
SHA512
6edfa0814551f4253a319f0a48a1812f8b99662749cca4d0e2072a9bd23878853e0cc088b63566d4963f975ddf935a8b76e871d307e860a447e0dcd85eb359d4
Static task
static1
Behavioral task
behavioral1
Sample
50ed87aac6767a2650e54b96f1c7d7be08ae652f9dda30253a271fae1f0811cd.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
50ed87aac6767a2650e54b96f1c7d7be08ae652f9dda30253a271fae1f0811cd
-
Size
1.1MB
-
MD5
d15f9783772ea30b93ea65e5ebc27895
-
SHA1
e591de1936ef9bb12a7301628899013f408724ae
-
SHA256
50ed87aac6767a2650e54b96f1c7d7be08ae652f9dda30253a271fae1f0811cd
-
SHA512
6edfa0814551f4253a319f0a48a1812f8b99662749cca4d0e2072a9bd23878853e0cc088b63566d4963f975ddf935a8b76e871d307e860a447e0dcd85eb359d4
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-
Suspicious use of SetThreadContext
-