Analysis
-
max time kernel
124s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-02-2022 12:46
Static task
static1
Behavioral task
behavioral1
Sample
525290a0b745ca14629504364609587f123d5b924004c5e542703d8eaf127c3f.exe
Resource
win7-en-20211208
windows7_x64
0 signatures
0 seconds
General
-
Target
525290a0b745ca14629504364609587f123d5b924004c5e542703d8eaf127c3f.exe
-
Size
1.1MB
-
MD5
f61b6543fa50129b2a18c778c10c8f9c
-
SHA1
ff73721c5a733765db6a850b56c602a5fe39af70
-
SHA256
525290a0b745ca14629504364609587f123d5b924004c5e542703d8eaf127c3f
-
SHA512
d00bb238c3b64b88c1037074835777e0154ca0aabcb05965c07b67c965a07bfc8cc3ef63971ad5499c233ce6bd3d7fef650f39a6de775f68f29ad25439526984
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1040 525290a0b745ca14629504364609587f123d5b924004c5e542703d8eaf127c3f.exe