Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 20:47
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
1c244e6177b96c38b434d44b9864a646.exe
Resource
win7-20231215-en
windows7-x64
2 signatures
150 seconds
General
-
Target
1c244e6177b96c38b434d44b9864a646.exe
-
Size
506KB
-
MD5
1c244e6177b96c38b434d44b9864a646
-
SHA1
2babc77c85fe8d1c0e49dcae3d4b916a544ea1ab
-
SHA256
7ebaa4a24c2b6e1cb609cb5a518cfe2b4759f0eea9d8f2eebb01fdefd1c8d2af
-
SHA512
44c900031858514f6da327ae5d02bc7a558a6af40d7bc5a787f74b0be44d873e785ab533148dca1bd7a406f6e2a68f7594b27adb3ead9f65da364256b35b7ad9
-
SSDEEP
12288:ojcUJKA/vurw4UVmPgPg0cKZUqjNJ8pDJPuCT9a1:CckvSOVmPmgBKGONJ8pI1
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\wuftpd.dll 1c244e6177b96c38b434d44b9864a646.exe