General
-
Target
0cb127e5ec9973374bf7da9419d05531c1309795ad9b6bd439f340ffe6758664
-
Size
519KB
-
Sample
201113-f8l92xhkce
-
MD5
91d8145701fa8016e22acb6027d92217
-
SHA1
7c7a1d1ff327c914bc4b2cb838b62bf827361f0d
-
SHA256
0cb127e5ec9973374bf7da9419d05531c1309795ad9b6bd439f340ffe6758664
-
SHA512
46fe5e10355ce2cb9fedec0f477dc645c576def8af177b7fe812c96e674ecbd492c67e6c5c6de6b6f502e3b044b07f456ab9a2cfd3a6c5e416be4ae7961dc75a
Static task
static1
Behavioral task
behavioral1
Sample
0cb127e5ec9973374bf7da9419d05531c1309795ad9b6bd439f340ffe6758664.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
0cb127e5ec9973374bf7da9419d05531c1309795ad9b6bd439f340ffe6758664
-
Size
519KB
-
MD5
91d8145701fa8016e22acb6027d92217
-
SHA1
7c7a1d1ff327c914bc4b2cb838b62bf827361f0d
-
SHA256
0cb127e5ec9973374bf7da9419d05531c1309795ad9b6bd439f340ffe6758664
-
SHA512
46fe5e10355ce2cb9fedec0f477dc645c576def8af177b7fe812c96e674ecbd492c67e6c5c6de6b6f502e3b044b07f456ab9a2cfd3a6c5e416be4ae7961dc75a
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-