General
-
Target
53fb33119de8332150c17aefef898ea06246b8a9b0ff5cf4c286b45b3a955ddc
-
Size
573KB
-
Sample
201112-s2rvb4hj1e
-
MD5
ae6f291866a56b15c2ab6e26ccc9bb03
-
SHA1
014646c0b4b47ddcc25fbbe5a20bc2c63d595530
-
SHA256
53fb33119de8332150c17aefef898ea06246b8a9b0ff5cf4c286b45b3a955ddc
-
SHA512
7a5a693cc2a633da610ef04fc320fcedacec153d49658fb645ed579cd6881ccac0c3aa4a63bd3188e68572d9e806fcf3eae9b734904a7fa7824b66c8834b56cc
Static task
static1
Behavioral task
behavioral1
Sample
53fb33119de8332150c17aefef898ea06246b8a9b0ff5cf4c286b45b3a955ddc.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
53fb33119de8332150c17aefef898ea06246b8a9b0ff5cf4c286b45b3a955ddc
-
Size
573KB
-
MD5
ae6f291866a56b15c2ab6e26ccc9bb03
-
SHA1
014646c0b4b47ddcc25fbbe5a20bc2c63d595530
-
SHA256
53fb33119de8332150c17aefef898ea06246b8a9b0ff5cf4c286b45b3a955ddc
-
SHA512
7a5a693cc2a633da610ef04fc320fcedacec153d49658fb645ed579cd6881ccac0c3aa4a63bd3188e68572d9e806fcf3eae9b734904a7fa7824b66c8834b56cc
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-