General
-
Target
7cb751b77521c3ed5b38e59cc9e9444cb7eff428e1d94c10b800a6982ac1abda
-
Size
185KB
-
Sample
201111-8dgmbxffma
-
MD5
a4588f57322665c795bdf720abc23ffc
-
SHA1
5ffe084c5f679f50b7c5cb872dcf7c2c1af3fe04
-
SHA256
7cb751b77521c3ed5b38e59cc9e9444cb7eff428e1d94c10b800a6982ac1abda
-
SHA512
2d2945460a4f46bffa2be1cd82eca432e146fe89d2416378c8ddb7e933f58ffa288050dd7f50c3ef49d8f3e004001c8b4e9735ba36cf80870adcaec540d3af14
Static task
static1
Behavioral task
behavioral1
Sample
7cb751b77521c3ed5b38e59cc9e9444cb7eff428e1d94c10b800a6982ac1abda.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
7cb751b77521c3ed5b38e59cc9e9444cb7eff428e1d94c10b800a6982ac1abda
-
Size
185KB
-
MD5
a4588f57322665c795bdf720abc23ffc
-
SHA1
5ffe084c5f679f50b7c5cb872dcf7c2c1af3fe04
-
SHA256
7cb751b77521c3ed5b38e59cc9e9444cb7eff428e1d94c10b800a6982ac1abda
-
SHA512
2d2945460a4f46bffa2be1cd82eca432e146fe89d2416378c8ddb7e933f58ffa288050dd7f50c3ef49d8f3e004001c8b4e9735ba36cf80870adcaec540d3af14
-
Deletes itself
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-