General
-
Target
7cff96accaa7a709e1f6be3cd007a2011af3cffd97d7941cb7706ab87bc8000a
-
Size
105KB
-
Sample
201114-jw2h5m7g62
-
MD5
1ff18de65423c4c50002e21c341786ba
-
SHA1
57be30756574240bc3387dd4ecc3fc0d81be2a3c
-
SHA256
7cff96accaa7a709e1f6be3cd007a2011af3cffd97d7941cb7706ab87bc8000a
-
SHA512
c13f4b82fbea4b0933574d8eff6be6947a3e4990c1fe14ff7ab9739a5b125f926529edc9ae52492c22d4ec6b6ba2abf8d18ab828e720ff02f8f3f15a4b8f2e72
Static task
static1
Behavioral task
behavioral1
Sample
7cff96accaa7a709e1f6be3cd007a2011af3cffd97d7941cb7706ab87bc8000a.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
7cff96accaa7a709e1f6be3cd007a2011af3cffd97d7941cb7706ab87bc8000a
-
Size
105KB
-
MD5
1ff18de65423c4c50002e21c341786ba
-
SHA1
57be30756574240bc3387dd4ecc3fc0d81be2a3c
-
SHA256
7cff96accaa7a709e1f6be3cd007a2011af3cffd97d7941cb7706ab87bc8000a
-
SHA512
c13f4b82fbea4b0933574d8eff6be6947a3e4990c1fe14ff7ab9739a5b125f926529edc9ae52492c22d4ec6b6ba2abf8d18ab828e720ff02f8f3f15a4b8f2e72
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-