Analysis
-
max time kernel
57s -
max time network
73s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
01-04-2022 19:41
Static task
static1
Behavioral task
behavioral1
Sample
Loader.exe
Resource
win7-20220331-en
windows7_x64
0 signatures
0 seconds
General
-
Target
Loader.exe
-
Size
7.2MB
-
MD5
3f9c1455992239f4efe31f0e56773433
-
SHA1
67a11f42f5e9ca4b5f2e906b34492bdc91b5ea57
-
SHA256
5d6c176341db385db8e279629a038781c08e15e33e052ac4c26ad58457871e4e
-
SHA512
6b468d7c4b0e2f9077ebc5958dbcb31b4dedec762fbee334dcb4f56bb4834bb6d354e2c7635ff969ee5ed76e15b1833299230529a0aad5ecc9c0716cf84525a9
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\C:\Users\Admin\AppData\Local\Temp\Loader.exe.lock Loader.exe