2c7f7e20c7a34ee2741439521012189a.exe

General
Target

2c7f7e20c7a34ee2741439521012189a.exe

Size

933KB

Sample

201120-re7szr878j

Score
7 /10
MD5

2c7f7e20c7a34ee2741439521012189a

SHA1

2c6cc4d6dc0f6979b31f7c0198be0cd67a420e0d

SHA256

295e83465c510501f5c2a7f998f0f1b83bead17be26d226c4eafa2867190027e

SHA512

95063c163b0936b7fafeb9ddfea786cc1f50f9f236bc88dfc4b45bef5087ba1d12547a49814f19215c98be3ba9acab354a06a5062d6dadd3e85acf353bba6992

Malware Config
Targets
Target

2c7f7e20c7a34ee2741439521012189a.exe

MD5

2c7f7e20c7a34ee2741439521012189a

Filesize

933KB

Score
7 /10
SHA1

2c6cc4d6dc0f6979b31f7c0198be0cd67a420e0d

SHA256

295e83465c510501f5c2a7f998f0f1b83bead17be26d226c4eafa2867190027e

SHA512

95063c163b0936b7fafeb9ddfea786cc1f50f9f236bc88dfc4b45bef5087ba1d12547a49814f19215c98be3ba9acab354a06a5062d6dadd3e85acf353bba6992

Tags

Signatures

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Accesses cryptocurrency files/wallets, possible credential harvesting

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry
  • Looks up external IP address via web service

    Description

    Uses a legitimate IP lookup service to find the infected system's external IP.

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                  Privilege Escalation
                    Tasks

                    static1

                    behavioral1

                    7/10

                    behavioral2

                    7/10