Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/03/2024, 04:02
Static task
static1
3 signatures
Behavioral task
behavioral1
Sample
db756c811ac925a0f8a30a774f2982b0f1e22c2b007038049c2bbeae5ca7840f.exe
Resource
win7-20240221-en
3 signatures
150 seconds
General
-
Target
db756c811ac925a0f8a30a774f2982b0f1e22c2b007038049c2bbeae5ca7840f.exe
-
Size
25.5MB
-
MD5
bd65c346e48dbd03fbb1a2763dfab270
-
SHA1
0b3fdb643a14731607509bdfd28e5bf839751d2c
-
SHA256
db756c811ac925a0f8a30a774f2982b0f1e22c2b007038049c2bbeae5ca7840f
-
SHA512
cf0c9060c9f35f08c29b4ada2217c1267c5a418ab65dad19700195f0200544b23c8c0194ece9c828510f9b537d68dce6ced89537766c57114f10daddf223b720
-
SSDEEP
196608:D9YBVxwnn+bONYasqpWH5zjsQ0prg+US2/5Hmni3QM:qJwnbsD5zjsppU1Ai3l
Malware Config
Signatures
-
Detects executables Discord URL observed in first stage droppers 1 IoCs
resource yara_rule behavioral1/memory/2328-0-0x000000013FAA0000-0x00000001413C8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_DiscordURL -
Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
resource yara_rule behavioral1/memory/2328-0-0x000000013FAA0000-0x00000001413C8000-memory.dmp INDICATOR_SUSPICIOUS_EXE_SQLQuery_ConfidentialDataStore -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.