General
-
Target
d39ad5a55253710f0869adc9e33b604e
-
Size
7.6MB
-
Sample
201214-klvm3nfyka
-
MD5
d39ad5a55253710f0869adc9e33b604e
-
SHA1
958068a419f4f7a936fee8cb74f8573822600e7d
-
SHA256
65d3591d7b9e812861bfc619c867b60793f704cd99a4681d1c2a8c1ca2c11e3a
-
SHA512
e4d9a18e23306978a3f329b2ac1e7bf574a60f6ba85f588a589969a64111cc53360f015dc33b5436311b70633b683ee0ee981b47de54080b04fe672b997ab228
Static task
static1
Behavioral task
behavioral1
Sample
d39ad5a55253710f0869adc9e33b604e.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
d39ad5a55253710f0869adc9e33b604e.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
d39ad5a55253710f0869adc9e33b604e
-
Size
7.6MB
-
MD5
d39ad5a55253710f0869adc9e33b604e
-
SHA1
958068a419f4f7a936fee8cb74f8573822600e7d
-
SHA256
65d3591d7b9e812861bfc619c867b60793f704cd99a4681d1c2a8c1ca2c11e3a
-
SHA512
e4d9a18e23306978a3f329b2ac1e7bf574a60f6ba85f588a589969a64111cc53360f015dc33b5436311b70633b683ee0ee981b47de54080b04fe672b997ab228
Score7/10-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Drops autorun.inf file
Malware can abuse Windows Autorun to spread further via attached volumes.
-