General
-
Target
cb913fe4fb5cec0cc979dd246567210b54cea7595180ea2b01c81c0d56b3e011
-
Size
393KB
-
Sample
201114-h2wlhfrer2
-
MD5
0ae59db6acc628cc24efdfbe2ffc4c4a
-
SHA1
bc9e6431fee419d2424a0954ee38bb80749630ef
-
SHA256
cb913fe4fb5cec0cc979dd246567210b54cea7595180ea2b01c81c0d56b3e011
-
SHA512
5362df69f4dc7df01b8e115ec5a416438ba76ea72703a5f5cd162f8032a472712d4668213c53b1f8f11b139720910253be8e91ef44a2a80fe93b23b86d3a640f
Static task
static1
Behavioral task
behavioral1
Sample
cb913fe4fb5cec0cc979dd246567210b54cea7595180ea2b01c81c0d56b3e011.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
cb913fe4fb5cec0cc979dd246567210b54cea7595180ea2b01c81c0d56b3e011
-
Size
393KB
-
MD5
0ae59db6acc628cc24efdfbe2ffc4c4a
-
SHA1
bc9e6431fee419d2424a0954ee38bb80749630ef
-
SHA256
cb913fe4fb5cec0cc979dd246567210b54cea7595180ea2b01c81c0d56b3e011
-
SHA512
5362df69f4dc7df01b8e115ec5a416438ba76ea72703a5f5cd162f8032a472712d4668213c53b1f8f11b139720910253be8e91ef44a2a80fe93b23b86d3a640f
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-