General
-
Target
9e2dee304f08830bfa6613f4e2f3ed9747f0891e5edea6fdd24b621fab850a96
-
Size
2.4MB
-
Sample
210301-rwgfgzr5be
-
MD5
7e8b83017a23b0689d96153cff3082be
-
SHA1
3447cb1807e91723e417cd329095153cb3f7c092
-
SHA256
9e2dee304f08830bfa6613f4e2f3ed9747f0891e5edea6fdd24b621fab850a96
-
SHA512
324df76b9c4756c05e449115f7c08953cb9d9448906288d8c3842097ab5df5bc812c0f189e77dbd94ad03f4941f05823718b017d13bd371fd6a05654621cdcb4
Static task
static1
Behavioral task
behavioral1
Sample
9e2dee304f08830bfa6613f4e2f3ed9747f0891e5edea6fdd24b621fab850a96.exe
Resource
win7v20201028
Malware Config
Targets
-
-
Target
9e2dee304f08830bfa6613f4e2f3ed9747f0891e5edea6fdd24b621fab850a96
-
Size
2.4MB
-
MD5
7e8b83017a23b0689d96153cff3082be
-
SHA1
3447cb1807e91723e417cd329095153cb3f7c092
-
SHA256
9e2dee304f08830bfa6613f4e2f3ed9747f0891e5edea6fdd24b621fab850a96
-
SHA512
324df76b9c4756c05e449115f7c08953cb9d9448906288d8c3842097ab5df5bc812c0f189e77dbd94ad03f4941f05823718b017d13bd371fd6a05654621cdcb4
-
Executes dropped EXE
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-