Analysis
-
max time kernel
61s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2022 16:12
Static task
static1
Behavioral task
behavioral1
Sample
1216d95c615702dbcdec6733bc6053c7c6f00b0e6c9d8fb86e237fa991f1e1ed.exe
Resource
win7-20220901-en
General
-
Target
1216d95c615702dbcdec6733bc6053c7c6f00b0e6c9d8fb86e237fa991f1e1ed.exe
-
Size
9KB
-
MD5
a8e77e42012123d976f667fe8129e137
-
SHA1
6cc36fec69d74ab9bb2aef0d6dfb749a1d872890
-
SHA256
1216d95c615702dbcdec6733bc6053c7c6f00b0e6c9d8fb86e237fa991f1e1ed
-
SHA512
11c68baccb88c0c0726bad7d440a462c1b89c0f7cf3dc3365a7dd487a7b68d2af068e55e52ac648a3595668a238e20eb80a70390fcef075845428424228242f0
-
SSDEEP
96:3m2unjKp7Y5DkYoCYNiESNfWNsn8WEmO8qQuD1oCbyRTq8Q0iitFS32hWN3QU:3Kup7iDkYDxNeNejEmO8q7xlbuTXjL3
Malware Config
Extracted
erbium
http://77.73.133.53/cloud/index.php
Signatures
-
Downloads MZ/PE file
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
1216d95c615702dbcdec6733bc6053c7c6f00b0e6c9d8fb86e237fa991f1e1ed.exepid process 4800 1216d95c615702dbcdec6733bc6053c7c6f00b0e6c9d8fb86e237fa991f1e1ed.exe 4800 1216d95c615702dbcdec6733bc6053c7c6f00b0e6c9d8fb86e237fa991f1e1ed.exe