General
-
Target
1.exe
-
Size
2.7MB
-
Sample
201109-6xljjz9eyj
-
MD5
5a4135a79283d211cf21820a67e01a4f
-
SHA1
fd1a1709b4346a4ca307d01cb85b5d6beb633733
-
SHA256
2ba2c20a826f51ed753f4f4dd78118d6f371a2fd5b4b0a2ff640c8f046d4fb55
-
SHA512
c6aa36b7326a461179dc0c8c14dc3552ccbf22d72490ee1d7ca90b3c9177538eff8e16258a2e42ab59b4c5999c25e420981dfc9e2fb6d4a1cc509c2c9534813b
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v20201028
Malware Config
Extracted
C:\How_To_Decrypt_Files.txt
http://t.me/yourfile2020
https://streamable.com/7h914
Targets
-
-
Target
1.exe
-
Size
2.7MB
-
MD5
5a4135a79283d211cf21820a67e01a4f
-
SHA1
fd1a1709b4346a4ca307d01cb85b5d6beb633733
-
SHA256
2ba2c20a826f51ed753f4f4dd78118d6f371a2fd5b4b0a2ff640c8f046d4fb55
-
SHA512
c6aa36b7326a461179dc0c8c14dc3552ccbf22d72490ee1d7ca90b3c9177538eff8e16258a2e42ab59b4c5999c25e420981dfc9e2fb6d4a1cc509c2c9534813b
Score10/10-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
JavaScript code in executable
-