General
-
Target
375934af4c0a7978d0ecb0657556bae8de6384147cf722db689970ebc00729bf
-
Size
583KB
-
Sample
201115-qj2s2fgpyx
-
MD5
afdfb08bd12c6cb9514d89f5674cebfa
-
SHA1
5a104222d67b3439e365252cf782409de27faa0c
-
SHA256
375934af4c0a7978d0ecb0657556bae8de6384147cf722db689970ebc00729bf
-
SHA512
efd4af509009121e96c9ddbee874892c91e9ffbad79d06f2b07ae29e3d2094b393afcc7a04377b10fd7058c0132911b87159bd7c37c3c8fd718eb40bd93b42ca
Static task
static1
Behavioral task
behavioral1
Sample
375934af4c0a7978d0ecb0657556bae8de6384147cf722db689970ebc00729bf.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
375934af4c0a7978d0ecb0657556bae8de6384147cf722db689970ebc00729bf
-
Size
583KB
-
MD5
afdfb08bd12c6cb9514d89f5674cebfa
-
SHA1
5a104222d67b3439e365252cf782409de27faa0c
-
SHA256
375934af4c0a7978d0ecb0657556bae8de6384147cf722db689970ebc00729bf
-
SHA512
efd4af509009121e96c9ddbee874892c91e9ffbad79d06f2b07ae29e3d2094b393afcc7a04377b10fd7058c0132911b87159bd7c37c3c8fd718eb40bd93b42ca
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-