General
-
Target
e2b97ee03b4b38578f04d0cc93d8effd
-
Size
517KB
-
Sample
201117-8abyhgpa52
-
MD5
1b219a340a68894bdb8602a882721ba7
-
SHA1
9bd74e03387a5a386e78f6936f2d73283e479956
-
SHA256
cb445a7c30381ebf9801a9c515a200fda63e80e955e810aff43acb7c0823dabe
-
SHA512
2154a68ab1f61d58af31ce70f6cdeea0d93c6c07cdcafe896e54b56a9b6165d653276171ba9a1df29436c48ac37f0889174f1858b900e1b4c41ef82b70347dd1
Static task
static1
Behavioral task
behavioral1
Sample
e2b97ee03b4b38578f04d0cc93d8effd.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
e2b97ee03b4b38578f04d0cc93d8effd
-
Size
517KB
-
MD5
1b219a340a68894bdb8602a882721ba7
-
SHA1
9bd74e03387a5a386e78f6936f2d73283e479956
-
SHA256
cb445a7c30381ebf9801a9c515a200fda63e80e955e810aff43acb7c0823dabe
-
SHA512
2154a68ab1f61d58af31ce70f6cdeea0d93c6c07cdcafe896e54b56a9b6165d653276171ba9a1df29436c48ac37f0889174f1858b900e1b4c41ef82b70347dd1
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-