Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 07:13
Behavioral task
behavioral1
Sample
Password Revealer 1.0/revealer.dll
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
Password Revealer 1.0/revealer.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
Password Revealer 1.0/revealer.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
Password Revealer 1.0/revealer.exe
Resource
win10v2004-20231215-en
General
-
Target
Password Revealer 1.0/revealer.exe
-
Size
6KB
-
MD5
9eac4f44283241ac2a3878d7d96a2450
-
SHA1
a547fe7a58719c43c1d26bb38eadfa8392604c05
-
SHA256
aa5641a1b488c5fce674d4023714436e0668808d3fbc5e59a09c76d28cde0c9a
-
SHA512
82ef8663ea64d621515ce659d06dfafeff342a2d60d4e23cd6963d4a8ee8539f607846de7a1cb1518fb0020d8c783fe0168e08baa002254e6bbd3494c38e7a9f
-
SSDEEP
96:Gk6BZSZjZ4blAj+duSRMJTPpS8rsEvrU/49:GlTSZj2Aj+duSRoPhwEv6g
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/1952-0-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral3/memory/1952-1-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1952 revealer.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1952 revealer.exe