General
-
Target
2681d4c9742631b3bddb5e9e7ca9956ceb966a6f694b0f706dfa90d8a4cf7ca4
-
Size
487KB
-
Sample
201111-c4es5l2pmn
-
MD5
bad103e7901dab550613a7d89bf10c4f
-
SHA1
4f34aebf03c1840ef604064deefc02a030501134
-
SHA256
2681d4c9742631b3bddb5e9e7ca9956ceb966a6f694b0f706dfa90d8a4cf7ca4
-
SHA512
b2be0cd2cb292b532adecadc5ea1e873ba8f44e3f64acc599038872cde6a070b8d18866e774c6e8dae3b6661a41e87facd58a3943d31395032868ef23638e715
Static task
static1
Behavioral task
behavioral1
Sample
2681d4c9742631b3bddb5e9e7ca9956ceb966a6f694b0f706dfa90d8a4cf7ca4.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
2681d4c9742631b3bddb5e9e7ca9956ceb966a6f694b0f706dfa90d8a4cf7ca4
-
Size
487KB
-
MD5
bad103e7901dab550613a7d89bf10c4f
-
SHA1
4f34aebf03c1840ef604064deefc02a030501134
-
SHA256
2681d4c9742631b3bddb5e9e7ca9956ceb966a6f694b0f706dfa90d8a4cf7ca4
-
SHA512
b2be0cd2cb292b532adecadc5ea1e873ba8f44e3f64acc599038872cde6a070b8d18866e774c6e8dae3b6661a41e87facd58a3943d31395032868ef23638e715
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-