General
-
Target
b5b2765aaf97ae9c22abd312e684616d
-
Size
820KB
-
Sample
201214-rvlc1zsl7x
-
MD5
b5b2765aaf97ae9c22abd312e684616d
-
SHA1
a66a652c2067f7489b83aba3b78502c0f482863b
-
SHA256
9f6d02b422cb72eb3bbc723b8b4a692bc9f641f1908b7e4b32685b2ad42fbef7
-
SHA512
af6c0a6c582a0cfd4f7de6bf1cf0199898b31edc0dba5467a499c2148e425d91d556bd7eebd08faf093d610cbf2afbee2237affc206106c7209cb2492a563279
Static task
static1
Behavioral task
behavioral1
Sample
b5b2765aaf97ae9c22abd312e684616d.dll
Resource
win7v20201028
Behavioral task
behavioral2
Sample
b5b2765aaf97ae9c22abd312e684616d.dll
Resource
win10v20201028
Malware Config
Targets
-
-
Target
b5b2765aaf97ae9c22abd312e684616d
-
Size
820KB
-
MD5
b5b2765aaf97ae9c22abd312e684616d
-
SHA1
a66a652c2067f7489b83aba3b78502c0f482863b
-
SHA256
9f6d02b422cb72eb3bbc723b8b4a692bc9f641f1908b7e4b32685b2ad42fbef7
-
SHA512
af6c0a6c582a0cfd4f7de6bf1cf0199898b31edc0dba5467a499c2148e425d91d556bd7eebd08faf093d610cbf2afbee2237affc206106c7209cb2492a563279
-
Suspicious use of NtCreateProcessExOtherParentProcess
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-