General
-
Target
3ebdd7d753526d8767e108598ce91c2f1c00f506a7413f65899f8c279cc031de.exe
-
Size
90KB
-
Sample
201107-3yg317qhks
-
MD5
d7325ce799aad3846363fbd2b2572dd0
-
SHA1
9248bb35d4cb664a1def67bf5867ffe3eabaf048
-
SHA256
3ebdd7d753526d8767e108598ce91c2f1c00f506a7413f65899f8c279cc031de
-
SHA512
3b16148b2134b3eda7e41acc27f30667dabf31865ba049c957836878cc7050b68bef53ba5c229076c3a26ca54f6a7f36f1c8bb77d18eada9d45ec5e649ddcafc
Static task
static1
Behavioral task
behavioral1
Sample
3ebdd7d753526d8767e108598ce91c2f1c00f506a7413f65899f8c279cc031de.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
3ebdd7d753526d8767e108598ce91c2f1c00f506a7413f65899f8c279cc031de.exe
-
Size
90KB
-
MD5
d7325ce799aad3846363fbd2b2572dd0
-
SHA1
9248bb35d4cb664a1def67bf5867ffe3eabaf048
-
SHA256
3ebdd7d753526d8767e108598ce91c2f1c00f506a7413f65899f8c279cc031de
-
SHA512
3b16148b2134b3eda7e41acc27f30667dabf31865ba049c957836878cc7050b68bef53ba5c229076c3a26ca54f6a7f36f1c8bb77d18eada9d45ec5e649ddcafc
-
Deletes itself
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-