Analysis
-
max time kernel
50s -
max time network
175s -
platform
windows10-1703_x64 -
resource
win10-20220901-en -
resource tags
arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system -
submitted
21-09-2022 22:27
Behavioral task
behavioral1
Sample
edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723.exe
Resource
win7-20220812-en
windows7-x64
3 signatures
300 seconds
General
-
Target
edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723.exe
-
Size
5.1MB
-
MD5
f83e21f51ee83b616b053ca7e19695a5
-
SHA1
62af9e5657773b77401bc002b38b11fbb1f52e1e
-
SHA256
edfefa4e334b6dc4252b079850d0666f30c5c8bcebc289faa06161c334faf723
-
SHA512
3af1b0e1bd3e3614eee8c3b3332a409b6fa2f200c67999cc4749b8932ead9cc5e2dcf90ea683208566dc949939d1b3985cb5359e82fefe0617584751ff58737b
-
SSDEEP
98304:0UwOhsGK16l/Xg7dIVcBrn305ia9WnUXSCkp77rN0lcI:0whsgaBIKn3m92Fr6W
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4808-120-0x00000000008A0000-0x0000000001B5E000-memory.dmp upx behavioral2/memory/4808-121-0x00000000008A0000-0x0000000001B5E000-memory.dmp upx behavioral2/memory/4808-122-0x00000000008A0000-0x0000000001B5E000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.