Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 12:57
Static task
static1
Behavioral task
behavioral1
Sample
a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe
Resource
win10v2004-20240221-en
General
-
Target
a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe
-
Size
199KB
-
MD5
c5bcb1322acea40d4e8a01ac3a205604
-
SHA1
664493247dd1d219b34e501078b47cba03e2d094
-
SHA256
a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c
-
SHA512
bb4f2dfa72e2ff3985c7f8f5b9115e47b3eb5c0967a04cb88c268510be566a2e45e51ff64738a732ff35a69e8b43c2b659094dc087f3ddbe38b78b7d54da1430
-
SSDEEP
3072:6DKW1FgppLRHMY0TBfJvjcTp5X73E4hm8gFTQuTGOGHcED:6DKW1Fgbdl0TBBvjc/CC9Zt
Malware Config
Signatures
-
Detect Poverty Stealer Payload 7 IoCs
resource yara_rule behavioral2/memory/5324-8-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/3532-14-0x0000000002720000-0x0000000004720000-memory.dmp family_povertystealer behavioral2/memory/5324-12-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/5324-15-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/5324-17-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/5324-21-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/3532-22-0x0000000002720000-0x0000000004720000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3532 set thread context of 5324 3532 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 87 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3532 wrote to memory of 5324 3532 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 87 PID 3532 wrote to memory of 5324 3532 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 87 PID 3532 wrote to memory of 5324 3532 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 87 PID 3532 wrote to memory of 5324 3532 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 87 PID 3532 wrote to memory of 5324 3532 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 87 PID 3532 wrote to memory of 5324 3532 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 87 PID 3532 wrote to memory of 5324 3532 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 87 PID 3532 wrote to memory of 5324 3532 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 87 PID 3532 wrote to memory of 5324 3532 a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe"C:\Users\Admin\AppData\Local\Temp\a2cca73f263f0bd9e12f682a2ee3598e25403fa33a953a680062b78a52d7662c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"2⤵PID:5324
-