Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
20-04-2022 02:56
Static task
static1
Behavioral task
behavioral1
Sample
afa4473efd11e002d40d802b442038862bec075b3e102bcffaa5bbeebaabaf96.exe
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
afa4473efd11e002d40d802b442038862bec075b3e102bcffaa5bbeebaabaf96.exe
-
Size
493KB
-
MD5
db2e50ca6bd801a5083e32da32644f02
-
SHA1
812e0d4eaee86b4ae3a0af4f22c53bcc03f0f967
-
SHA256
afa4473efd11e002d40d802b442038862bec075b3e102bcffaa5bbeebaabaf96
-
SHA512
ae4d7ada5f9769963409645cd9c3bb49c9a60088bc18ba43f51121590ed2f6cf8e69441d95415013d58689f4257dde47259e28d41cfe22d9db932d7d5e4c653e
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4300 afa4473efd11e002d40d802b442038862bec075b3e102bcffaa5bbeebaabaf96.exe 4300 afa4473efd11e002d40d802b442038862bec075b3e102bcffaa5bbeebaabaf96.exe