General
-
Target
4b880328263a8d3318d26b36eaeeda4a2a87962b9b84637a5878a11d5a9df304
-
Size
494KB
-
Sample
201112-x6rpwltqjn
-
MD5
edf05d043c8524a6ec76365dd406a483
-
SHA1
ceae5fa4c5545c73b0c68ff47314957e83a2062e
-
SHA256
4b880328263a8d3318d26b36eaeeda4a2a87962b9b84637a5878a11d5a9df304
-
SHA512
9a9cff00d958d821d6cba1ae09aba28f329675692e2008b1c97b730b46dbd5ffae03dc09aca2ec0670231a64b6555122c0659e75bec631e2314ca7aa7e7653d6
Static task
static1
Behavioral task
behavioral1
Sample
4b880328263a8d3318d26b36eaeeda4a2a87962b9b84637a5878a11d5a9df304.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
4b880328263a8d3318d26b36eaeeda4a2a87962b9b84637a5878a11d5a9df304
-
Size
494KB
-
MD5
edf05d043c8524a6ec76365dd406a483
-
SHA1
ceae5fa4c5545c73b0c68ff47314957e83a2062e
-
SHA256
4b880328263a8d3318d26b36eaeeda4a2a87962b9b84637a5878a11d5a9df304
-
SHA512
9a9cff00d958d821d6cba1ae09aba28f329675692e2008b1c97b730b46dbd5ffae03dc09aca2ec0670231a64b6555122c0659e75bec631e2314ca7aa7e7653d6
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-