General
-
Target
2335eadece5eb55aabe38bce2894f0c88f7305140613f3b6cfd92877d4fac7a4.exe
-
Size
97KB
-
Sample
210227-and7zl8dex
-
MD5
2a7bcaa19a035978b2ba6029f20d28f7
-
SHA1
f63bcbbe46ee36d0a268435b188ec1f81d6ff6c2
-
SHA256
2335eadece5eb55aabe38bce2894f0c88f7305140613f3b6cfd92877d4fac7a4
-
SHA512
131b64c1c11458adca8c07131833302cfc04a35e92403a6cfb63ebac95638c6a52e848bd5b8905da891be9d1a0f9ae5c37ad0c32e9253d9f71ac07ea13d3e80f
Static task
static1
Behavioral task
behavioral1
Sample
2335eadece5eb55aabe38bce2894f0c88f7305140613f3b6cfd92877d4fac7a4.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
2335eadece5eb55aabe38bce2894f0c88f7305140613f3b6cfd92877d4fac7a4.exe
-
Size
97KB
-
MD5
2a7bcaa19a035978b2ba6029f20d28f7
-
SHA1
f63bcbbe46ee36d0a268435b188ec1f81d6ff6c2
-
SHA256
2335eadece5eb55aabe38bce2894f0c88f7305140613f3b6cfd92877d4fac7a4
-
SHA512
131b64c1c11458adca8c07131833302cfc04a35e92403a6cfb63ebac95638c6a52e848bd5b8905da891be9d1a0f9ae5c37ad0c32e9253d9f71ac07ea13d3e80f
-
Deletes itself
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-