Analysis

  • max time kernel
    181s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    14-04-2022 12:43

General

  • Target

    08ecb2eaa2297e591f2832fe29271ce3467d718510c4bd89bc8fb1e46f6182b2.exe

  • Size

    1.1MB

  • MD5

    f2e41102b332ccc34d58b83de6475a4d

  • SHA1

    ffc375e3d8139fe42982639dcc9c9adc2c262f84

  • SHA256

    08ecb2eaa2297e591f2832fe29271ce3467d718510c4bd89bc8fb1e46f6182b2

  • SHA512

    5161e6223e19519b0684a7d8737d68b58b0dcfa18fa6abed1de12d447b858a8ee8ef97d2484a66989b28bc61f6dc6e59f0f71a482503a355c6e99389e865c245

Score
10/10

Malware Config

Signatures

  • Meta Stealer Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

Processes

  • C:\Users\Admin\AppData\Local\Temp\08ecb2eaa2297e591f2832fe29271ce3467d718510c4bd89bc8fb1e46f6182b2.exe
    "C:\Users\Admin\AppData\Local\Temp\08ecb2eaa2297e591f2832fe29271ce3467d718510c4bd89bc8fb1e46f6182b2.exe"
    1⤵
      PID:5056

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/5056-124-0x0000000000EC0000-0x0000000000FE8000-memory.dmp

      Filesize

      1.2MB

    • memory/5056-125-0x000000000B4D0000-0x000000000BA74000-memory.dmp

      Filesize

      5.6MB

    • memory/5056-126-0x000000000AF20000-0x000000000AFB2000-memory.dmp

      Filesize

      584KB

    • memory/5056-127-0x0000000005A50000-0x0000000005A5A000-memory.dmp

      Filesize

      40KB

    • memory/5056-128-0x000000000DA90000-0x000000000DFBC000-memory.dmp

      Filesize

      5.2MB

    • memory/5056-129-0x0000000005C30000-0x0000000005CCC000-memory.dmp

      Filesize

      624KB