General
-
Target
622a5a45bb1ca80c65ac9ba3f10ef053
-
Size
512KB
-
Sample
201117-36d5m3z5ce
-
MD5
6d2f2cccb0eff69cd6907abae041d6f4
-
SHA1
ee469791fe121842a9796e47cf40a16592af4b2a
-
SHA256
756e7cb702fa69a36bdb3a99b16d2bb2f8cdb97f7f41d7b50bbc19f58ff6b356
-
SHA512
57ee113cd9b70d6640dd564807a90d71f60b30d344e7e9077a4fcd0e10177aa7a6a5eab3a0ba3b303cbe7a413ed19b570bcfaef9189636ecea8f7cae76963edf
Static task
static1
Behavioral task
behavioral1
Sample
622a5a45bb1ca80c65ac9ba3f10ef053.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
622a5a45bb1ca80c65ac9ba3f10ef053
-
Size
512KB
-
MD5
6d2f2cccb0eff69cd6907abae041d6f4
-
SHA1
ee469791fe121842a9796e47cf40a16592af4b2a
-
SHA256
756e7cb702fa69a36bdb3a99b16d2bb2f8cdb97f7f41d7b50bbc19f58ff6b356
-
SHA512
57ee113cd9b70d6640dd564807a90d71f60b30d344e7e9077a4fcd0e10177aa7a6a5eab3a0ba3b303cbe7a413ed19b570bcfaef9189636ecea8f7cae76963edf
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-