General
-
Target
ad2b6de5fb2ee29b62d3a71195beffd1
-
Size
539KB
-
Sample
201117-w4maatns26
-
MD5
68f41a4a60a3c9d33cf4a4e07a4e524d
-
SHA1
ff73c1abcbd73179020d3e4d2013137936ed48e2
-
SHA256
7d75e67add3d3ea32c9b6dbdc8f9debb87039dec036bb5c01140bb3dc4dea10a
-
SHA512
7c8c75d2b0cb3cfe5ec6a03142d41e4ece453dcec7b461d13036d096a10c8813d36c29514bdaaf6959e6effe156a4ab1eeb3ddd8b5177f25a099ad98bf2c6dad
Static task
static1
Behavioral task
behavioral1
Sample
ad2b6de5fb2ee29b62d3a71195beffd1.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
ad2b6de5fb2ee29b62d3a71195beffd1
-
Size
539KB
-
MD5
68f41a4a60a3c9d33cf4a4e07a4e524d
-
SHA1
ff73c1abcbd73179020d3e4d2013137936ed48e2
-
SHA256
7d75e67add3d3ea32c9b6dbdc8f9debb87039dec036bb5c01140bb3dc4dea10a
-
SHA512
7c8c75d2b0cb3cfe5ec6a03142d41e4ece453dcec7b461d13036d096a10c8813d36c29514bdaaf6959e6effe156a4ab1eeb3ddd8b5177f25a099ad98bf2c6dad
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-