General
-
Target
ig.bin.zip
-
Size
8KB
-
Sample
210105-nvk7x357fx
-
MD5
eb8abafea2ebd63aad27be7ece31b000
-
SHA1
dc1c91623dc7f66eaf011b068d90f2813fdd5dd0
-
SHA256
64b79b39880ac4347dc81b66b73fafef3a2b15c4111e7f916a9ee03d6c3ebe63
-
SHA512
78339dc685b8133f9a1241354522bfa56b90e9aca29f99bfed2fa87c6b64f7f6b91a931b45b0d8e6f1eacb01a99347d10e00ff1e86f32e358672ce3552fd57ee
Static task
static1
Behavioral task
behavioral1
Sample
ig.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
ig.bin.exe
Resource
win10v20201028
Malware Config
Targets
-
-
Target
ig.bin
-
Size
21KB
-
MD5
d10baf3651281f8d8ba87c5e824c31af
-
SHA1
2674f1891609f04d576cf295a6c4bc004488357a
-
SHA256
4940614325f6ba206d9eab2b1b82af37e9f662a3b9c97eff00a7a398169e22fa
-
SHA512
1c0d6f387d44c4c4097ebc65f477d9b1728e76a9aac7e6d7c3768e7c3ebddfe6e65611693e2c93a873ca198b2fe31cc13a01b43cbff3a01ca9200f8d7e8757a8
Score8/10-
Executes dropped EXE
-
Modifies extensions of user files
Ransomware generally changes the extension on encrypted files.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-