General
-
Target
871dafc04000289326c28c857d4147a735d96a05e1287630e39d6e4993e0eb23
-
Size
570KB
-
Sample
201111-sxpdhybkvn
-
MD5
8279c5e334028729ac9f31a2c7d4d870
-
SHA1
04dfa7cd4548a4731e7b00ec3c12b12e3bc2723f
-
SHA256
871dafc04000289326c28c857d4147a735d96a05e1287630e39d6e4993e0eb23
-
SHA512
d70816227b5fa2804fec7be1888456fbd1ea0a90eb016c3dc1c8ab896a1d343f972a1c4a144ae8010bc3d154cabf12615dd76f7cc92c9cac07e943ced522d4ae
Static task
static1
Behavioral task
behavioral1
Sample
871dafc04000289326c28c857d4147a735d96a05e1287630e39d6e4993e0eb23.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
871dafc04000289326c28c857d4147a735d96a05e1287630e39d6e4993e0eb23
-
Size
570KB
-
MD5
8279c5e334028729ac9f31a2c7d4d870
-
SHA1
04dfa7cd4548a4731e7b00ec3c12b12e3bc2723f
-
SHA256
871dafc04000289326c28c857d4147a735d96a05e1287630e39d6e4993e0eb23
-
SHA512
d70816227b5fa2804fec7be1888456fbd1ea0a90eb016c3dc1c8ab896a1d343f972a1c4a144ae8010bc3d154cabf12615dd76f7cc92c9cac07e943ced522d4ae
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-