General
-
Target
f4dfcb74fef5ac45f6eea3c8e40129e28b220b14819208bafa955b6e1585a5f1
-
Size
576KB
-
Sample
201112-bhrnx6yrms
-
MD5
1c2e514e2725049532622f2da73c8a1b
-
SHA1
202214f21d398212345a47e3b9684cbe91202dd7
-
SHA256
f4dfcb74fef5ac45f6eea3c8e40129e28b220b14819208bafa955b6e1585a5f1
-
SHA512
be1bc967cf2023d63c46d6c0625b99f3b8bb36842346f15fdb0ee85c83db67d288067570c84273e6fbc9e6f1d0b6c295780de3b63c8cd41f3d9bc721fa6f8e08
Static task
static1
Behavioral task
behavioral1
Sample
f4dfcb74fef5ac45f6eea3c8e40129e28b220b14819208bafa955b6e1585a5f1.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
f4dfcb74fef5ac45f6eea3c8e40129e28b220b14819208bafa955b6e1585a5f1
-
Size
576KB
-
MD5
1c2e514e2725049532622f2da73c8a1b
-
SHA1
202214f21d398212345a47e3b9684cbe91202dd7
-
SHA256
f4dfcb74fef5ac45f6eea3c8e40129e28b220b14819208bafa955b6e1585a5f1
-
SHA512
be1bc967cf2023d63c46d6c0625b99f3b8bb36842346f15fdb0ee85c83db67d288067570c84273e6fbc9e6f1d0b6c295780de3b63c8cd41f3d9bc721fa6f8e08
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-