7zS850A099E.zip
7zS850A099E/61e7501db65f3_Tue23c7b395c3.exe
1MB
19-01-2022 08:14
79400b1fd740d9cb7ec7c2c2e9a7d618
8ab8d7dcd469853f61ca27b8afe2ab6e0f2a1bb3
556d5c93b2ceb585711ccce22e39e3327f388b893d76a3a7974967fe99a6fa7f
Filter: none
-
Executes dropped EXE11111.exe
Reported IOCs
pid process 2096 11111.exe -
UPX packed file
Description
Detects executables packed with UPX/modified UPX open source packer.
Tags
Reported IOCs
resource yara_rule behavioral22/files/0x00080000000220b9-130.dat upx behavioral22/files/0x00080000000220b9-131.dat upx -
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Looks up external IP address via web service
Description
Uses a legitimate IP lookup service to find the infected system's external IP.
Reported IOCs
flow ioc 8 ip-api.com -
Suspicious behavior: EnumeratesProcesses11111.exe
Reported IOCs
pid process 2096 11111.exe 2096 11111.exe 2096 11111.exe 2096 11111.exe -
Suspicious use of WriteProcessMemory61e7501db65f3_Tue23c7b395c3.exe
Reported IOCs
description pid process target process PID 3500 wrote to memory of 2096 3500 61e7501db65f3_Tue23c7b395c3.exe 11111.exe PID 3500 wrote to memory of 2096 3500 61e7501db65f3_Tue23c7b395c3.exe 11111.exe PID 3500 wrote to memory of 2096 3500 61e7501db65f3_Tue23c7b395c3.exe 11111.exe
-
C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe"C:\Users\Admin\AppData\Local\Temp\7zS850A099E\61e7501db65f3_Tue23c7b395c3.exe"Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\11111.exeC:\Users\Admin\AppData\Local\Temp\11111.exe /stab C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txtExecutes dropped EXESuspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\11111.exe
MD5d0527733abcc5c58735e11d43061b431
SHA128de9d191826192721e325787b8a50a84328cffd
SHA256b4ef7ee228c1500f7bb3686361b1a246954efe04cf14d218b5ee709bc0d88b45
SHA5127704b215fade38c9a4aa2395263f3d4d9392b318b5644146464d233006a6de86f53a5f6e47cd909c0d968e3ef4db397f52e28ca4d6a1b2e88e1c40a1dbde3fb5
-
C:\Users\Admin\AppData\Local\Temp\11111.exe
MD5d0527733abcc5c58735e11d43061b431
SHA128de9d191826192721e325787b8a50a84328cffd
SHA256b4ef7ee228c1500f7bb3686361b1a246954efe04cf14d218b5ee709bc0d88b45
SHA5127704b215fade38c9a4aa2395263f3d4d9392b318b5644146464d233006a6de86f53a5f6e47cd909c0d968e3ef4db397f52e28ca4d6a1b2e88e1c40a1dbde3fb5
-
C:\Users\Admin\AppData\Local\Temp\fj4ghga23_fsa.txt
MD51260763403cd6c8c8f71f3f29acc4744
SHA133bd943683ffe7ce5ca4f6018f1071b8a6fa0adf
SHA25659c8f656bc1871e425a8610af17dc1e9794f0345876f04254d4b87855533fe19
SHA5124fb6b69d1da1958d0d3cee299099dc2048790bbf1eea1958bb75d5896362472261b227eca1e2084b449cb0d2bd152fbf337ed4fb4cb9ad6816670159b534ca79