General
-
Target
1c7e6efa98f896453080926d8a06a0f34dc89efc5e284cc6d827514e357064a1
-
Size
273KB
-
Sample
201108-my71rt8qqn
-
MD5
1cd64557583a7131ff7ba4645b5cabde
-
SHA1
60953f75f0ce09ddbe7e3b8b93120e5def98541b
-
SHA256
1c7e6efa98f896453080926d8a06a0f34dc89efc5e284cc6d827514e357064a1
-
SHA512
49e8d53adbf42a982aaed759607f609ebf9aec9f8874a5973f58d4b9e2f3594534c7e661ee2dfb01147052b64c3f4032f8720dab477f3455a6488ef6fea3f75f
Static task
static1
Behavioral task
behavioral1
Sample
1c7e6efa98f896453080926d8a06a0f34dc89efc5e284cc6d827514e357064a1.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
1c7e6efa98f896453080926d8a06a0f34dc89efc5e284cc6d827514e357064a1
-
Size
273KB
-
MD5
1cd64557583a7131ff7ba4645b5cabde
-
SHA1
60953f75f0ce09ddbe7e3b8b93120e5def98541b
-
SHA256
1c7e6efa98f896453080926d8a06a0f34dc89efc5e284cc6d827514e357064a1
-
SHA512
49e8d53adbf42a982aaed759607f609ebf9aec9f8874a5973f58d4b9e2f3594534c7e661ee2dfb01147052b64c3f4032f8720dab477f3455a6488ef6fea3f75f
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-