Resubmissions

24/10/2021, 13:48

211024-q39hvaebc4 8

26/08/2021, 13:23

210826-43nr8691ns 8

Analysis

  • max time kernel
    148s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    24/10/2021, 13:48

General

  • Target

    402313e6b87dd3ef9e3b848b315bf3e6fdb3fe6671bdca38fcadfe8396536de7.exe

  • Size

    440KB

  • MD5

    ee4fa8efb7477465a3f8a29a8e2a2e29

  • SHA1

    6a0f698712161fae61dcbf811841b509b42cb08c

  • SHA256

    402313e6b87dd3ef9e3b848b315bf3e6fdb3fe6671bdca38fcadfe8396536de7

  • SHA512

    ba04e86752c235772325ae0ad1f8dba93b7fc536958d08f63de364c66268b1c93c63f210802d564cde2ead7cee5cef15ab4add0fbc0a7b57e9f1d8cdf72bddef

Score
7/10

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\402313e6b87dd3ef9e3b848b315bf3e6fdb3fe6671bdca38fcadfe8396536de7.exe
    "C:\Users\Admin\AppData\Local\Temp\402313e6b87dd3ef9e3b848b315bf3e6fdb3fe6671bdca38fcadfe8396536de7.exe"
    1⤵
    • Drops desktop.ini file(s)
    PID:3600

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads