Analysis
-
max time kernel
143s -
max time network
162s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 04:31
Static task
static1
Behavioral task
behavioral1
Sample
9eab342fc6b07e177d150c3b26940b2f9147c5352942fb8ff89f752b351000c6.exe
Resource
win7-20220812-en
General
-
Target
9eab342fc6b07e177d150c3b26940b2f9147c5352942fb8ff89f752b351000c6.exe
-
Size
233KB
-
MD5
8d7fb284d9014adcf1311423678cb064
-
SHA1
57ceb203380ceb013d4976c64197ed6551081e7b
-
SHA256
9eab342fc6b07e177d150c3b26940b2f9147c5352942fb8ff89f752b351000c6
-
SHA512
6fc00e4a526f504019b0ab8958c23bc43c0689e402e2a519ba93fe5929fc667278e9e523df70075d8540cf2b8181c3a1e61e836eb98bdbdbe1e1c29753622509
-
SSDEEP
3072:X/SltaxM5rs16TkTPs4WZXP05zzzzz6zzzzzz0qtZ40/uDf7SGVzZsmHTg2:PSjiK8T28qtZruDf7SGVzZlB
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1956 9eab342fc6b07e177d150c3b26940b2f9147c5352942fb8ff89f752b351000c6.exe 1956 9eab342fc6b07e177d150c3b26940b2f9147c5352942fb8ff89f752b351000c6.exe