General
-
Target
7f8a5f0c96b850acb1f6e5a56ca19188
-
Size
427KB
-
Sample
201117-9dnfh68mdx
-
MD5
372ddd810cea9782ecd2807ad1e54fa2
-
SHA1
7c3cc00cd71ad3e8dc3ed330448576d34efc336e
-
SHA256
fa06675d892b6951126471d5087f8f20666824a7df2243a96f6231a443fae75d
-
SHA512
12e479d1c073d66462626b969c693902c76ad31d7c81d027b35fd0d473918c1883025c80672c546ca1f23411a8d11664d3cf008e02c62c8362fd7c9ddda8e50e
Static task
static1
Behavioral task
behavioral1
Sample
7f8a5f0c96b850acb1f6e5a56ca19188.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
7f8a5f0c96b850acb1f6e5a56ca19188
-
Size
427KB
-
MD5
372ddd810cea9782ecd2807ad1e54fa2
-
SHA1
7c3cc00cd71ad3e8dc3ed330448576d34efc336e
-
SHA256
fa06675d892b6951126471d5087f8f20666824a7df2243a96f6231a443fae75d
-
SHA512
12e479d1c073d66462626b969c693902c76ad31d7c81d027b35fd0d473918c1883025c80672c546ca1f23411a8d11664d3cf008e02c62c8362fd7c9ddda8e50e
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-