General
-
Target
4d7fef569b77cfb9745915b46ca00463029b924260115b8cf36feb1e076d15fa
-
Size
473KB
-
Sample
201115-emrwj975xe
-
MD5
082e05f7227db58d98e16ee66ac13491
-
SHA1
63fdce19da4d562922f8ffeb7af4d80edf20e19a
-
SHA256
4d7fef569b77cfb9745915b46ca00463029b924260115b8cf36feb1e076d15fa
-
SHA512
16b35dc4fa79f79aa77a4e6ffc607da3d21eac1c282031a379f6d93545eac25aa578e23d49b4fe8302456e08b154adc46119e9f4b39451040292af4381a82012
Static task
static1
Behavioral task
behavioral1
Sample
4d7fef569b77cfb9745915b46ca00463029b924260115b8cf36feb1e076d15fa.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
4d7fef569b77cfb9745915b46ca00463029b924260115b8cf36feb1e076d15fa
-
Size
473KB
-
MD5
082e05f7227db58d98e16ee66ac13491
-
SHA1
63fdce19da4d562922f8ffeb7af4d80edf20e19a
-
SHA256
4d7fef569b77cfb9745915b46ca00463029b924260115b8cf36feb1e076d15fa
-
SHA512
16b35dc4fa79f79aa77a4e6ffc607da3d21eac1c282031a379f6d93545eac25aa578e23d49b4fe8302456e08b154adc46119e9f4b39451040292af4381a82012
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-