General
-
Target
fc9515a9819e0faf9b2ab1f485e7d49e10189fdb5b780a8fb779e62586d918b2
-
Size
473KB
-
Sample
201112-391c1g5yka
-
MD5
7dabfa271278f3bffb0c8e7eec379f6d
-
SHA1
63c59286cc86577c38af9953cf8656bfa82394e6
-
SHA256
fc9515a9819e0faf9b2ab1f485e7d49e10189fdb5b780a8fb779e62586d918b2
-
SHA512
e8109d144ec0ec7ae653a6ba40fa2c672ef6bbf77643b01e82fcc2d0c019c25bdb96cfbfc05263156be5102b6c38c7499db664cb00e7a597bd306a9ee1bf2da6
Static task
static1
Behavioral task
behavioral1
Sample
fc9515a9819e0faf9b2ab1f485e7d49e10189fdb5b780a8fb779e62586d918b2.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
fc9515a9819e0faf9b2ab1f485e7d49e10189fdb5b780a8fb779e62586d918b2
-
Size
473KB
-
MD5
7dabfa271278f3bffb0c8e7eec379f6d
-
SHA1
63c59286cc86577c38af9953cf8656bfa82394e6
-
SHA256
fc9515a9819e0faf9b2ab1f485e7d49e10189fdb5b780a8fb779e62586d918b2
-
SHA512
e8109d144ec0ec7ae653a6ba40fa2c672ef6bbf77643b01e82fcc2d0c019c25bdb96cfbfc05263156be5102b6c38c7499db664cb00e7a597bd306a9ee1bf2da6
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-