Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 21:59
Behavioral task
behavioral1
Sample
759e4e7e34dde8df76a86460a92aa4df.exe
Resource
win7-20231215-en
windows7-x64
3 signatures
150 seconds
General
-
Target
759e4e7e34dde8df76a86460a92aa4df.exe
-
Size
236KB
-
MD5
759e4e7e34dde8df76a86460a92aa4df
-
SHA1
a2c1096fd59e2908ab35f56b7fc0e2917832a428
-
SHA256
0bea475ff766ccda1d1063e1f3b828fd2d244f9c3b4310e77fd5e24269719370
-
SHA512
78f790306470d0b440d39b6a40fca6c6760f794f2559c5190e9f5e3b7f7be458fe709285f0544525fa604dc808eac34cb5ec6f53d0ecfaaec71f30f50c9b2652
-
SSDEEP
6144:xL/4gIi0FcKgY4QXlksfDQ93ha4l0uYnjXzLxnRLuG4:xTWcKh1XlksERha97xRKf
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2660-0-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-1-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-2-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-3-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-4-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-5-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-6-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-7-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-8-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-9-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-10-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-11-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-12-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-13-0x0000000000400000-0x0000000000488000-memory.dmp upx behavioral2/memory/2660-14-0x0000000000400000-0x0000000000488000-memory.dmp upx