Analysis
-
max time kernel
174s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 11:47
Static task
static1
Behavioral task
behavioral1
Sample
1bdefd0114b515185c51daf4caba1604.exe
Resource
win7-20231215-en
General
-
Target
1bdefd0114b515185c51daf4caba1604.exe
-
Size
55KB
-
MD5
1bdefd0114b515185c51daf4caba1604
-
SHA1
50fa091423265c9f35c42542b50b2aa78a313669
-
SHA256
5c8ce9fb74edfb0cae4e05db7563f38c32ad0c3bbbbed58a7914940915bde164
-
SHA512
51114cdafbdf4918b52dc2099cbf5c9ce3bd0762bb390a24aac918b52a299bffdc88baa4ae1ec44e1abe41de3d012efea3db210a4743519cb78696cc9e4a0b18
-
SSDEEP
1536:NQ56/eLLlTV/mGLfK+P/Rrh0anLF4vqUtrq+CbVj/kI7voN3VVNFcRbsENDYEQ24:NsDdK4VJ5q0G
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1bdefd0114b515185c51daf4caba1604.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1bdefd0114b515185c51daf4caba1604.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 1bdefd0114b515185c51daf4caba1604.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2432 1bdefd0114b515185c51daf4caba1604.exe 2432 1bdefd0114b515185c51daf4caba1604.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD52d662fed701ae7c7bf86d1a728165d1b
SHA1356b5419f3180de64e8b2a8f25306620d738b7fc
SHA2569ebd2dde4278893646a4e23b9218865c40f1661a881527d4d2fa53e5f03eef43
SHA5124e0420b1458a5a73b2c9b6748c8210e0fa57497c0fc8c42988e9c04e5ffe02d872d5c6759759f3a8e7f376ea62b71bda417a193be9e4c09ae9f55a868af10858