General
-
Target
pipeline.rtf
-
Size
85KB
-
Sample
201204-h5d4ztty4e
-
MD5
63604a063f6f0d2c2c9e670776e59352
-
SHA1
a925d6b0b29d9c159772f90bc2ed7e791650b782
-
SHA256
d6d41ff08e0a47d38fae24dc18e1d03911298e41559280dac8759bba7155494d
-
SHA512
8174c95c11db1d3a279584b78cd9679aae9974fe5b71b2c578c4ce5c3db2658dc2eb7ffcc9d975d674cccdbddaf3dba3bbe72dd629f3fb723ab411aa63223cf1
Static task
static1
Behavioral task
behavioral1
Sample
pipeline.rtf
Resource
win7v20201028
Behavioral task
behavioral2
Sample
pipeline.rtf
Resource
win10v20201028
Malware Config
Targets
-
-
Target
pipeline.rtf
-
Size
85KB
-
MD5
63604a063f6f0d2c2c9e670776e59352
-
SHA1
a925d6b0b29d9c159772f90bc2ed7e791650b782
-
SHA256
d6d41ff08e0a47d38fae24dc18e1d03911298e41559280dac8759bba7155494d
-
SHA512
8174c95c11db1d3a279584b78cd9679aae9974fe5b71b2c578c4ce5c3db2658dc2eb7ffcc9d975d674cccdbddaf3dba3bbe72dd629f3fb723ab411aa63223cf1
Score7/10-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops Chrome extension
-