Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:27
Behavioral task
behavioral1
Sample
9a349f12172540f544a4b2fcd2e81487f6d045c17e0c9498dd3f0c1dc844a623.exe
Resource
win7-20221111-en
windows7-x64
2 signatures
150 seconds
General
-
Target
9a349f12172540f544a4b2fcd2e81487f6d045c17e0c9498dd3f0c1dc844a623.exe
-
Size
180KB
-
MD5
1fa287a3020609018921cccd1cd761c5
-
SHA1
cbc0e671415a9ab2cff4fe6a04ef890fbc4507ad
-
SHA256
9a349f12172540f544a4b2fcd2e81487f6d045c17e0c9498dd3f0c1dc844a623
-
SHA512
0f9f00474174a66887fe7a41305541fda1db1ae64efefee09f8b9cee4a9015d4d88f7f6c4512bae9bc41af810cadde05262dcc68f503b18b6c8bbdacf91d9d92
-
SSDEEP
3072:2kedKUTyeA9jXaic/Hj46vJn/YIYB6+nUDqKe4ADBv5A5cEy+7wvOy5tGdwLypE:XedKj9rS46pk6CclCDGcF+7wvl5tIwLr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4204-132-0x0000000000400000-0x000000000047C000-memory.dmp upx behavioral2/memory/4204-133-0x0000000000400000-0x000000000047C000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.