General
-
Target
fd99712113fbc6ed5c88886da730806a765d96231fe27f5697b0bf5a75124b36
-
Size
185KB
-
Sample
201112-6b19axdkpa
-
MD5
6a968487ec0f68d87dbd782a22448944
-
SHA1
5e1745063e16ea8ba94e4a9da03d8550a7b4d94e
-
SHA256
fd99712113fbc6ed5c88886da730806a765d96231fe27f5697b0bf5a75124b36
-
SHA512
37b2804a655b98faf103d88601fa68892e36949cffe13ff8db2d9de5f9ac029ec2a18f52296d6b6c8f26b3a427632dfa6a75fe69dc9b71cd612a80cdf5fc14dc
Static task
static1
Behavioral task
behavioral1
Sample
fd99712113fbc6ed5c88886da730806a765d96231fe27f5697b0bf5a75124b36.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
fd99712113fbc6ed5c88886da730806a765d96231fe27f5697b0bf5a75124b36
-
Size
185KB
-
MD5
6a968487ec0f68d87dbd782a22448944
-
SHA1
5e1745063e16ea8ba94e4a9da03d8550a7b4d94e
-
SHA256
fd99712113fbc6ed5c88886da730806a765d96231fe27f5697b0bf5a75124b36
-
SHA512
37b2804a655b98faf103d88601fa68892e36949cffe13ff8db2d9de5f9ac029ec2a18f52296d6b6c8f26b3a427632dfa6a75fe69dc9b71cd612a80cdf5fc14dc
-
Deletes itself
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-