General
-
Target
92678db3d2ffd733118b597f00f15ae6c401ea45ad862fd1db6f90925670ec5a
-
Size
576KB
-
Sample
201111-l7vn9dt8wj
-
MD5
d913ad3ba69e84e1491411f6c53be4b8
-
SHA1
576b2057b303ef29d803ab5b79b719b3b1fd0bca
-
SHA256
92678db3d2ffd733118b597f00f15ae6c401ea45ad862fd1db6f90925670ec5a
-
SHA512
376954da69da44392821b0c8e88a283fdeaa4eac3885d618e2973252c35063403d10c990845dd95437cc19177012afe934c7d2f515789de7474df6658c3b4860
Static task
static1
Behavioral task
behavioral1
Sample
92678db3d2ffd733118b597f00f15ae6c401ea45ad862fd1db6f90925670ec5a.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
92678db3d2ffd733118b597f00f15ae6c401ea45ad862fd1db6f90925670ec5a
-
Size
576KB
-
MD5
d913ad3ba69e84e1491411f6c53be4b8
-
SHA1
576b2057b303ef29d803ab5b79b719b3b1fd0bca
-
SHA256
92678db3d2ffd733118b597f00f15ae6c401ea45ad862fd1db6f90925670ec5a
-
SHA512
376954da69da44392821b0c8e88a283fdeaa4eac3885d618e2973252c35063403d10c990845dd95437cc19177012afe934c7d2f515789de7474df6658c3b4860
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-