Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
12-04-2023 16:02
Behavioral task
behavioral1
Sample
a4191e00cd9dfeda78901ef9dae317e23c73408e7b4c1eeef8de6a8c70fe9db7.exe
Resource
win7-20230220-en
General
-
Target
a4191e00cd9dfeda78901ef9dae317e23c73408e7b4c1eeef8de6a8c70fe9db7.exe
-
Size
28KB
-
MD5
716d01d18140ec5e18b1a15c17fb213f
-
SHA1
b4f2063ade43a0c6ddd15f3f34dbfde348e3eecc
-
SHA256
a4191e00cd9dfeda78901ef9dae317e23c73408e7b4c1eeef8de6a8c70fe9db7
-
SHA512
5ccc9c8afc8848cd64aaa0f1cdf03b27e0be3d89d01857a5e112dfa54391af627938bd186b157ffe86e49854b1fff536297e07a888ef2d0000364a9fb3bf8c55
-
SSDEEP
768:4u3dYXhvK1Wm2k7/fwL1G8u+Y1mFcCbwh0:4u3ShK15WfY1mFcCbwh0
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5690489105:AAEQZjYHEOdNHOLcf-ksLf347CR9V3wq4ss/sendMessage?chat_id=6195973924
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 3 ip-api.com -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1560 a4191e00cd9dfeda78901ef9dae317e23c73408e7b4c1eeef8de6a8c70fe9db7.exe