General
-
Target
49ebef70fa634005cfe5fa3be7b8e2167c64328ebaf3f41e10121b7b1368cd6d
-
Size
473KB
-
Sample
201111-n5c9dzdz72
-
MD5
a818e774faa8c61bbdd722f7b15dae05
-
SHA1
000c4faff5a58bebb9b36d458f4107183d13d486
-
SHA256
49ebef70fa634005cfe5fa3be7b8e2167c64328ebaf3f41e10121b7b1368cd6d
-
SHA512
a93de176ab006d03edc98577e7daaadd8a0e06bedbebb5e56005f49d0fce203d2e37ed3d35e077012c4be5984f12be42c95a20044c3af75108bc486ef5e8a252
Static task
static1
Behavioral task
behavioral1
Sample
49ebef70fa634005cfe5fa3be7b8e2167c64328ebaf3f41e10121b7b1368cd6d.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
49ebef70fa634005cfe5fa3be7b8e2167c64328ebaf3f41e10121b7b1368cd6d
-
Size
473KB
-
MD5
a818e774faa8c61bbdd722f7b15dae05
-
SHA1
000c4faff5a58bebb9b36d458f4107183d13d486
-
SHA256
49ebef70fa634005cfe5fa3be7b8e2167c64328ebaf3f41e10121b7b1368cd6d
-
SHA512
a93de176ab006d03edc98577e7daaadd8a0e06bedbebb5e56005f49d0fce203d2e37ed3d35e077012c4be5984f12be42c95a20044c3af75108bc486ef5e8a252
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-