Analysis
-
max time kernel
53s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
21-02-2023 19:42
Behavioral task
behavioral1
Sample
817ee46423164cf2502ae2accffecaa1.exe
Resource
win7-20230220-en
windows7-x64
3 signatures
150 seconds
General
-
Target
817ee46423164cf2502ae2accffecaa1.exe
-
Size
174KB
-
MD5
817ee46423164cf2502ae2accffecaa1
-
SHA1
565cf5d2a163b63cf77e15e9e0800f760e7af92a
-
SHA256
350edaca28b1572c31165431bafc7d1e0552c45f3186ffa039de33a58e55144e
-
SHA512
5fa849b19455fdb0f6b20cd393f6cdea5b23d79ba0263533d3dfdad8b0ef517c3729201b67e06b4c56bb71db1b956eba888b28ae6ac8b2d9415ae99fe7c07b46
-
SSDEEP
3072:zVIfP18LszB9a93iz5AOmbKtpJCjutK6n58+ZMCTXlmIghEHCL9OqiWLBWQAAf:zo18eY3sSOGc5HMel+hEHEqw
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.