General
-
Target
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f
-
Size
507KB
-
Sample
201203-8vnj2wyrex
-
MD5
b916ccb2a2bf0381133e5b8ef9782e1f
-
SHA1
4a740790a645000119070122c710e1bac020bd25
-
SHA256
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f
-
SHA512
04f973bf5606bc585e9eacd2937503047b27530dfdf9a5b830fa2deb679fbbf84a9494504de6c37a8b48785dc7ccc74a1ab50b34a860729f66cdeb3bcfd2bcc8
Static task
static1
Behavioral task
behavioral1
Sample
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f.dll
Resource
win7v20201028
Malware Config
Targets
-
-
Target
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f
-
Size
507KB
-
MD5
b916ccb2a2bf0381133e5b8ef9782e1f
-
SHA1
4a740790a645000119070122c710e1bac020bd25
-
SHA256
15870ef831ecc0908e86ca4ff0987ff42049bbaf96ee96db2761018854b7647f
-
SHA512
04f973bf5606bc585e9eacd2937503047b27530dfdf9a5b830fa2deb679fbbf84a9494504de6c37a8b48785dc7ccc74a1ab50b34a860729f66cdeb3bcfd2bcc8
-
ServiceHost packer
Detects ServiceHost packer used for .NET malware
-
Deletes itself
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-