General
-
Target
palata.exe
-
Size
4.4MB
-
Sample
210114-pv2rte9qen
-
MD5
812bbffb66a539c9877cbd6802b37ac6
-
SHA1
812efac17807890ec2664bbe33a035fc6e73f9ca
-
SHA256
94122aa4df273a94c2f6970bf9593f72090d9ddee16821d24d56299a3ed0af86
-
SHA512
521a2547b633e78253b1f250e84f4adbea4dcfe469d8e0ae981d138bdff2fa6af4ae7ecef8e5addeb9dd0574138c303bebb579d2065f71b3e6225fe29afbf88a
Static task
static1
Behavioral task
behavioral1
Sample
palata.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
palata.exe
-
Size
4.4MB
-
MD5
812bbffb66a539c9877cbd6802b37ac6
-
SHA1
812efac17807890ec2664bbe33a035fc6e73f9ca
-
SHA256
94122aa4df273a94c2f6970bf9593f72090d9ddee16821d24d56299a3ed0af86
-
SHA512
521a2547b633e78253b1f250e84f4adbea4dcfe469d8e0ae981d138bdff2fa6af4ae7ecef8e5addeb9dd0574138c303bebb579d2065f71b3e6225fe29afbf88a
-
Blocklisted process makes network request
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s)
-