Analysis
-
max time kernel
147s -
max time network
77s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04/10/2022, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
743eed5df54b5bb3252ee28b2f0a5c1a23098636026fe88313d055bf036d2fde.exe
Resource
win7-20220812-en
General
-
Target
743eed5df54b5bb3252ee28b2f0a5c1a23098636026fe88313d055bf036d2fde.exe
-
Size
2.0MB
-
MD5
1e1cd5797af842d423d39b473d65eb6e
-
SHA1
4ea4a49fca975806c9171db3c6a34960226e4568
-
SHA256
743eed5df54b5bb3252ee28b2f0a5c1a23098636026fe88313d055bf036d2fde
-
SHA512
259ce1aa983b27dbe3547142a0083f381775fa91792a794253fb1b6fd98f4109d4d82b64b79059a00a55122dad0f973ab907781a2a249a5f3b0670e2b92ebedc
-
SSDEEP
1536:+aS0Ca0CppH736dStlgvc3NTc0akM0R/YS1Ngu:+ksStlgGNlhZl16u
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Internet Explorer\Main 743eed5df54b5bb3252ee28b2f0a5c1a23098636026fe88313d055bf036d2fde.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1968 743eed5df54b5bb3252ee28b2f0a5c1a23098636026fe88313d055bf036d2fde.exe 1968 743eed5df54b5bb3252ee28b2f0a5c1a23098636026fe88313d055bf036d2fde.exe