Analysis
-
max time kernel
76s -
max time network
277s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-02-2021 08:57
Static task
static1
Behavioral task
behavioral1
Sample
1b0000.exe.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
1b0000.exe.exe
-
Size
79KB
-
MD5
6654235619b25fd70f0233aec854e0ea
-
SHA1
35b3ffe69da3c97ac10240a83dd413d78c1deff8
-
SHA256
83956ff42ffb6c352e3257a55ab76416b120a1cbf6b1f92672d50c4b8fae404f
-
SHA512
fb15de14ce4667f66ac6b6fc9fc3dfa9898a9e9f061c4e496f36567d9dcae43336d093bb0030ecdfccb570b8df66843a61a45dc6e0891da051ab0eaac92cf158
Score
7/10
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 eth0.me -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1b0000.exe.exedescription pid process Token: SeDebugPrivilege 1856 1b0000.exe.exe