8f96aa45f0dc7b30f4b15739e0679b7a.exe

General
Target

8f96aa45f0dc7b30f4b15739e0679b7a.exe

Size

433KB

Sample

201125-1pvlamjmqs

Score
7 /10
MD5

8f96aa45f0dc7b30f4b15739e0679b7a

SHA1

5a405823e2516a40e62e83dd4010a012590a6403

SHA256

68f9243f40945d2c3f15bed2d106401737caa94a26716af3d5918b3c0f760e8b

SHA512

4b9e3755af957009644d563ca054a961c9377202b0e10a4dd55f219fa25049fd264624a1f96ad372e1836f9afa4351b8aaaf477ded414274c31be2d18019541c

Malware Config
Targets
Target

8f96aa45f0dc7b30f4b15739e0679b7a.exe

MD5

8f96aa45f0dc7b30f4b15739e0679b7a

Filesize

433KB

Score
7 /10
SHA1

5a405823e2516a40e62e83dd4010a012590a6403

SHA256

68f9243f40945d2c3f15bed2d106401737caa94a26716af3d5918b3c0f760e8b

SHA512

4b9e3755af957009644d563ca054a961c9377202b0e10a4dd55f219fa25049fd264624a1f96ad372e1836f9afa4351b8aaaf477ded414274c31be2d18019541c

Tags

Signatures

  • Reads user/profile data of web browsers

    Description

    Infostealers often target stored browser data, which can include saved credentials etc.

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Accesses 2FA software files, possible credential harvesting

    Tags

    TTPs

    Data from Local System Credentials in Files
  • Checks installed software on the system

    Description

    Looks up Uninstall key entries in the registry to enumerate software on the system.

    Tags

    TTPs

    Query Registry

Related Tasks

MITRE ATT&CK Matrix
Command and Control
    Credential Access
    Defense Evasion
      Discovery
      Execution
        Exfiltration
          Impact
            Initial Access
              Lateral Movement
                Persistence
                Privilege Escalation
                  Tasks

                  static1

                  behavioral1

                  7/10

                  behavioral2

                  7/10