General
-
Target
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba
-
Size
365KB
-
Sample
201110-vfa8yr1kp2
-
MD5
7012fcbeda3bebbceef18eba8e2a78db
-
SHA1
64bf265931d406c6c1632c5a6a16cbf335b1202e
-
SHA256
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba
-
SHA512
9761ab641cc625e804922522c6b89d95f1dee7325f634d39f6f8eb71cd45af8b75f24152759ee59977cf026fa696d85d77161cd3db246915b2240e31c1f69a6b
Static task
static1
Behavioral task
behavioral1
Sample
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba
-
Size
365KB
-
MD5
7012fcbeda3bebbceef18eba8e2a78db
-
SHA1
64bf265931d406c6c1632c5a6a16cbf335b1202e
-
SHA256
d0136345e5d9b60ead6b8eabdd9887f43f96a27bfc2c1812737da9858e32d6ba
-
SHA512
9761ab641cc625e804922522c6b89d95f1dee7325f634d39f6f8eb71cd45af8b75f24152759ee59977cf026fa696d85d77161cd3db246915b2240e31c1f69a6b
-
Executes dropped EXE
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-