General
-
Target
f11fdfc926699e7d517c6ec814c00c733363a6085a76de11d127d6168081369c
-
Size
424KB
-
Sample
201117-8lfvqtbcbx
-
MD5
9c6ff2e879267a87598f51bbb8496df2
-
SHA1
2822dc4cd859662f64db9f620ab04767ca6f9872
-
SHA256
f11fdfc926699e7d517c6ec814c00c733363a6085a76de11d127d6168081369c
-
SHA512
a8a2c538331e4e064a897ac3a45f482ac1d579589990c6cb0741f586d6929364ce6a34908a50676f053fa14708041e014c020649054e17722da0c9d8a370efa4
Static task
static1
Behavioral task
behavioral1
Sample
f11fdfc926699e7d517c6ec814c00c733363a6085a76de11d127d6168081369c.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
f11fdfc926699e7d517c6ec814c00c733363a6085a76de11d127d6168081369c
-
Size
424KB
-
MD5
9c6ff2e879267a87598f51bbb8496df2
-
SHA1
2822dc4cd859662f64db9f620ab04767ca6f9872
-
SHA256
f11fdfc926699e7d517c6ec814c00c733363a6085a76de11d127d6168081369c
-
SHA512
a8a2c538331e4e064a897ac3a45f482ac1d579589990c6cb0741f586d6929364ce6a34908a50676f053fa14708041e014c020649054e17722da0c9d8a370efa4
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-