Analysis
-
max time kernel
141s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2023 09:34
Static task
static1
Behavioral task
behavioral1
Sample
15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe
Resource
win10v2004-20231127-en
General
-
Target
15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe
-
Size
15.3MB
-
MD5
cb031980eb0030f7096b5e097e841a87
-
SHA1
7d1b8a56ed0fa8b367605ed3b909cbfe2f9f017d
-
SHA256
15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353
-
SHA512
a57ad511b35d84b598b4b221615cced0cfa2c8eeceb770d235f500ea4d5ffccc6fd670b246a19c38f0bd215f2eb9994b485027f1e453b96ad02d2e4c74cfc7e9
-
SSDEEP
196608:usTThnGlMNmviSDpnol5grgEvAzR6X08FCncKyDwl7aUDwyrcvUNcID3U:/lncMNkiionogQTF4Rp1cvYcI
Malware Config
Signatures
-
Detect Poverty Stealer Payload 9 IoCs
resource yara_rule behavioral2/memory/4340-4-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/4340-9-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/4340-7-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/4340-11-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/4340-13-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/4340-14-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/4340-15-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/4340-16-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer behavioral2/memory/4340-17-0x0000000000400000-0x0000000000411000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 624 set thread context of 4340 624 15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe 87 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 624 wrote to memory of 4340 624 15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe 87 PID 624 wrote to memory of 4340 624 15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe 87 PID 624 wrote to memory of 4340 624 15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe 87 PID 624 wrote to memory of 4340 624 15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe 87 PID 624 wrote to memory of 4340 624 15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe 87 PID 624 wrote to memory of 4340 624 15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe 87 PID 624 wrote to memory of 4340 624 15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe 87 PID 624 wrote to memory of 4340 624 15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe 87 PID 624 wrote to memory of 4340 624 15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe"C:\Users\Admin\AppData\Local\Temp\15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe"C:\Users\Admin\AppData\Local\Temp\15399042016065429443742d3638917dffec34e0ae6921d4b10ba9b5c2bf4353.exe"2⤵PID:4340
-