Analysis
-
max time kernel
161s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
09/03/2022, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f.exe
Resource
win10v2004-en-20220112
General
-
Target
107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f.exe
-
Size
292KB
-
MD5
8fe6f25fc7e8c0caab2fdca8b9a3be89
-
SHA1
a30bf5d046b6255fa2c4b029abbcf734824a7f15
-
SHA256
107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f
-
SHA512
e2c28b474b0825890f58cbf1a98d36e4ceef6aa1def9d0ac527f7b0679b39a38672f8732757c0184f3576683d770c43d006bc9c2b29bfeadec418390f44812a3
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 api.ipify.org 4 api.ipify.org -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 756 107da216ad99b7c0171745fe7f826e51b27b1812d435b55c3ddb801e23137d8f.exe