General
-
Target
39de62da4dfeff9120a26dde09bdc502.exe
-
Size
514KB
-
Sample
210129-3383kfar4j
-
MD5
39de62da4dfeff9120a26dde09bdc502
-
SHA1
662f8450dbd60272fb395758b4066bf8f942c4c8
-
SHA256
5f6379caf6c4986e747ba2b28f5b66cf53bb9eea1c560e67ff15d1f43357878d
-
SHA512
d43a6d705d40d1ee8e6e29fbbe03a9d03e704b6864aaf7bf245738b270fbb7c1aad71940cb144507b8ec96c4731afa1e4104348b0001715faf4c360f30595bd8
Static task
static1
Behavioral task
behavioral1
Sample
39de62da4dfeff9120a26dde09bdc502.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
39de62da4dfeff9120a26dde09bdc502.exe
-
Size
514KB
-
MD5
39de62da4dfeff9120a26dde09bdc502
-
SHA1
662f8450dbd60272fb395758b4066bf8f942c4c8
-
SHA256
5f6379caf6c4986e747ba2b28f5b66cf53bb9eea1c560e67ff15d1f43357878d
-
SHA512
d43a6d705d40d1ee8e6e29fbbe03a9d03e704b6864aaf7bf245738b270fbb7c1aad71940cb144507b8ec96c4731afa1e4104348b0001715faf4c360f30595bd8
-
Deletes itself
-
Loads dropped DLL
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
JavaScript code in executable
-