Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 14:48
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.4ff962e91f04db381460c62243098e7f30749f42112e187470535b3097b70585exe_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
NEAS.4ff962e91f04db381460c62243098e7f30749f42112e187470535b3097b70585exe_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
NEAS.4ff962e91f04db381460c62243098e7f30749f42112e187470535b3097b70585exe_JC.exe
-
Size
75KB
-
MD5
bd72bf76dafdb9c92bb7037fb0daac51
-
SHA1
b4de7b3a08453fa4c8aebcd4dffddbcffbb43fff
-
SHA256
4ff962e91f04db381460c62243098e7f30749f42112e187470535b3097b70585
-
SHA512
be6277dd9b5903cf28ac4c8bf02d6eef1b85470496d738af25ac91798063c19921a1b906e7afd7eca85b87753959794bca3af95302a787b2074b3c332ffa429a
-
SSDEEP
1536:1Q4VxgEgDW1K6PNtP1zyUkvpfnl54I2HuDvt:1bLgD36PBzyU6TSux
Malware Config
Signatures
-
Detect Poverty Stealer Payload 7 IoCs
resource yara_rule behavioral2/memory/5100-1-0x0000000002020000-0x000000000202A000-memory.dmp family_povertystealer behavioral2/memory/5100-6-0x0000000002020000-0x000000000202A000-memory.dmp family_povertystealer behavioral2/memory/5100-8-0x0000000002020000-0x000000000202A000-memory.dmp family_povertystealer behavioral2/memory/5100-9-0x0000000002020000-0x000000000202A000-memory.dmp family_povertystealer behavioral2/memory/5100-12-0x0000000002020000-0x000000000202A000-memory.dmp family_povertystealer behavioral2/memory/5100-14-0x0000000002020000-0x000000000202A000-memory.dmp family_povertystealer behavioral2/memory/5100-15-0x0000000002020000-0x000000000202A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.