Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
15/10/2023, 19:55
Static task
static1
Behavioral task
behavioral1
Sample
fb5c40147c7d3782dc6a5fde3f416030_console.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
fb5c40147c7d3782dc6a5fde3f416030_console.exe
Resource
win10v2004-20230915-en
General
-
Target
fb5c40147c7d3782dc6a5fde3f416030_console.exe
-
Size
153KB
-
MD5
fb5c40147c7d3782dc6a5fde3f416030
-
SHA1
19f515116d8daef3df0822c0a7b75f8fbedc2d72
-
SHA256
195f1e4d21431ebce397d9341fe74b69c03c9627550be61690c86c6ca2589f93
-
SHA512
48212a97966c1d95b630add41828dc0f86fe5549a4964e9716c8752ce292005dfb3175271e2456fe36293ecfcd969d9952eaac867930cc4f29a9fc9f230d8721
-
SSDEEP
3072:2oWX4QTDtjLgGRapv4y05qAE22N1uZ3LxNVqkwGSOZJFU:qX4QTpQpq5I22Q3LxRZzU
Malware Config
Signatures
-
Detect Poverty Stealer Payload 5 IoCs
resource yara_rule behavioral1/memory/2080-1-0x00000000001C0000-0x00000000001D1000-memory.dmp family_povertystealer behavioral1/memory/2080-7-0x00000000001C0000-0x00000000001D1000-memory.dmp family_povertystealer behavioral1/memory/2080-8-0x00000000001C0000-0x00000000001D1000-memory.dmp family_povertystealer behavioral1/memory/2080-12-0x00000000001C0000-0x00000000001D1000-memory.dmp family_povertystealer behavioral1/memory/2080-13-0x00000000001C0000-0x00000000001D1000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Program crash 1 IoCs
pid pid_target Process procid_target 3024 2080 WerFault.exe 13 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2080 wrote to memory of 3024 2080 fb5c40147c7d3782dc6a5fde3f416030_console.exe 29 PID 2080 wrote to memory of 3024 2080 fb5c40147c7d3782dc6a5fde3f416030_console.exe 29 PID 2080 wrote to memory of 3024 2080 fb5c40147c7d3782dc6a5fde3f416030_console.exe 29 PID 2080 wrote to memory of 3024 2080 fb5c40147c7d3782dc6a5fde3f416030_console.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb5c40147c7d3782dc6a5fde3f416030_console.exe"C:\Users\Admin\AppData\Local\Temp\fb5c40147c7d3782dc6a5fde3f416030_console.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2080 -s 37362⤵
- Program crash
PID:3024
-