General
-
Target
6e9e765900a37a5118eedf83e492e3cd0f4e60255c450c41c8e7ca92b942b50e.bin.sample.gz
-
Size
1.5MB
-
Sample
201204-ms6v84trm2
-
MD5
d63ff68a26f29dcc3cf92792c3d1ad2a
-
SHA1
ba717f121caf180e314c658905c61d4651465d42
-
SHA256
be281e17265ea42cc901e5b6a47270c8b7d6ee662e6a751c7bb50ed3342bf7a8
-
SHA512
a3fd277adef2d8a8e6193c4f0dcb130629ea0b123db89543546f0869a02a61d7cee06df18ad3a3b2cf4291021edc5366223d8c0da6ec3d268c06cfcec2b8f69f
Static task
static1
Behavioral task
behavioral1
Sample
sample.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
sample.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
sample
-
Size
1.5MB
-
MD5
a977133d76993d426e85c68da079e73a
-
SHA1
fbda809127571078743e26e770196ed4eb094ad1
-
SHA256
6e9e765900a37a5118eedf83e492e3cd0f4e60255c450c41c8e7ca92b942b50e
-
SHA512
73c61a18f96a220e731422211e7cb87d3e2116052f0ec92dccd7c5a178ab4ad1a6a2881c49a7ad9a287fb72fb8eddcfcc6431e3f78f9a300b8df8db15bb1be62
Score7/10-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Writes to the Master Boot Record (MBR)
Bootkits write to the MBR to gain persistence at a level below the operating system.
-