Analysis
-
max time kernel
139s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 17:40
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
08ecdc91317a688c8a58de4e32a49124.exe
Resource
win7-20231215-en
4 signatures
150 seconds
General
-
Target
08ecdc91317a688c8a58de4e32a49124.exe
-
Size
188KB
-
MD5
08ecdc91317a688c8a58de4e32a49124
-
SHA1
dd7097cade1a43ce6e8368c96100b0c339a7674d
-
SHA256
689cba19e74d7c2e12870ce432a5058a324b93ae293cbd972831645b34aec502
-
SHA512
e37cdad69c78a18c3deb3ac98e517cea4d44f07ed3f10067b82a3b2df37d25eaa9532c29b3b4a0f206228b2774085f2e071d62a97bc47874aa9f24d8a35d658e
-
SSDEEP
3072:MQWYAu1vWsaPxUlJmOkuxNQWX4orjH+WEn83/prg:PTvtaaXBr6yPFg
Malware Config
Extracted
Credentials
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
zlTz3w5VRy
Extracted
Credentials
Protocol: smtp- Host:
smtp.uk.aol.com - Port:
587 - Username:
[email protected] - Password:
zlTz3w5VRy
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4512 08ecdc91317a688c8a58de4e32a49124.exe 4512 08ecdc91317a688c8a58de4e32a49124.exe 4512 08ecdc91317a688c8a58de4e32a49124.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4512 08ecdc91317a688c8a58de4e32a49124.exe