General
-
Target
cc14e8e4d0c0d5ff69ede4032f7d5559f28a93a26377ab9389fcdc48a9950cde
-
Size
161KB
-
Sample
210227-b3h62z8e8x
-
MD5
ecef9d33bc2b8a6583bee13efe1e71bf
-
SHA1
1b2ecd927c003673db35adaf0c8c900b205940b5
-
SHA256
cc14e8e4d0c0d5ff69ede4032f7d5559f28a93a26377ab9389fcdc48a9950cde
-
SHA512
8a4305cfb0a3bddd682a1ecbde25f2126af027c31cce716943ab0fa8afa6cf62c2aa3f8d2083d903555abb986f1c4277bf65ba2468ff725961c2b003ef816f6e
Static task
static1
Behavioral task
behavioral1
Sample
cc14e8e4d0c0d5ff69ede4032f7d5559f28a93a26377ab9389fcdc48a9950cde.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
cc14e8e4d0c0d5ff69ede4032f7d5559f28a93a26377ab9389fcdc48a9950cde
-
Size
161KB
-
MD5
ecef9d33bc2b8a6583bee13efe1e71bf
-
SHA1
1b2ecd927c003673db35adaf0c8c900b205940b5
-
SHA256
cc14e8e4d0c0d5ff69ede4032f7d5559f28a93a26377ab9389fcdc48a9950cde
-
SHA512
8a4305cfb0a3bddd682a1ecbde25f2126af027c31cce716943ab0fa8afa6cf62c2aa3f8d2083d903555abb986f1c4277bf65ba2468ff725961c2b003ef816f6e
-
Deletes itself
-
Reads data files stored by FTP clients
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-