General
-
Target
600552e69cace5f3ae996afd8c3376bd2bdd2d486e1fa7187587e197f25a86fa
-
Size
556KB
-
Sample
210227-43hh9rt9r6
-
MD5
ed1e5792000d46ce259f1921f014967d
-
SHA1
9e4d2aa15d2d6c61e3bebb0b5bd4d4c4d3f663fd
-
SHA256
600552e69cace5f3ae996afd8c3376bd2bdd2d486e1fa7187587e197f25a86fa
-
SHA512
c7a171a180960e993e752918a65687fe4f89edec7a4588cb670311c14682a62a017f37419de7ce2e7d4ef0b0dbe10b24c0f827ab9bd97d2714cec11e7bbc102b
Static task
static1
Behavioral task
behavioral1
Sample
600552e69cace5f3ae996afd8c3376bd2bdd2d486e1fa7187587e197f25a86fa.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
600552e69cace5f3ae996afd8c3376bd2bdd2d486e1fa7187587e197f25a86fa
-
Size
556KB
-
MD5
ed1e5792000d46ce259f1921f014967d
-
SHA1
9e4d2aa15d2d6c61e3bebb0b5bd4d4c4d3f663fd
-
SHA256
600552e69cace5f3ae996afd8c3376bd2bdd2d486e1fa7187587e197f25a86fa
-
SHA512
c7a171a180960e993e752918a65687fe4f89edec7a4588cb670311c14682a62a017f37419de7ce2e7d4ef0b0dbe10b24c0f827ab9bd97d2714cec11e7bbc102b
-
Deletes itself
-
Reads user/profile data of local email clients
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-