Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24/10/2021, 13:48
Static task
static1
Behavioral task
behavioral1
Sample
402313e6b87dd3ef9e3b848b315bf3e6fdb3fe6671bdca38fcadfe8396536de7.exe
Resource
win7-en-20211014
0 signatures
0 seconds
General
-
Target
402313e6b87dd3ef9e3b848b315bf3e6fdb3fe6671bdca38fcadfe8396536de7.exe
-
Size
440KB
-
MD5
ee4fa8efb7477465a3f8a29a8e2a2e29
-
SHA1
6a0f698712161fae61dcbf811841b509b42cb08c
-
SHA256
402313e6b87dd3ef9e3b848b315bf3e6fdb3fe6671bdca38fcadfe8396536de7
-
SHA512
ba04e86752c235772325ae0ad1f8dba93b7fc536958d08f63de364c66268b1c93c63f210802d564cde2ead7cee5cef15ab4add0fbc0a7b57e9f1d8cdf72bddef
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$Recycle.Bin\S-1-5-21-2481030822-2828258191-1606198294-1000\desktop.ini 402313e6b87dd3ef9e3b848b315bf3e6fdb3fe6671bdca38fcadfe8396536de7.exe