Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 19:23
Static task
static1
Behavioral task
behavioral1
Sample
c6ad494543f252a8b8e7caa86c950f54.exe
Resource
win7-20240221-en
4 signatures
150 seconds
General
-
Target
c6ad494543f252a8b8e7caa86c950f54.exe
-
Size
671KB
-
MD5
c6ad494543f252a8b8e7caa86c950f54
-
SHA1
42ffad5a4ca2245376e50404f012da335f57db35
-
SHA256
43ac8db5522d31dc3ecde6c0fc258eb7cd2aab49372083d71259581196c8cde9
-
SHA512
189df35655188cbf48346be08635b2959bdefc3ad0c51eccda0834d6be77345a290344bd5da8c0a8c811d704f48072a71eb98770d3c5fe2ad92b3319a29662ad
-
SSDEEP
12288:Me7juwDzvwnnjuWMAVwJwoQoS+lG7W5+gWE2qhdYxgddxFFipVqS5LJpMb5qQPpH:MelDz6njuWRw2joS+U4p3h2xudxFFi6d
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2868 c6ad494543f252a8b8e7caa86c950f54.exe 2868 c6ad494543f252a8b8e7caa86c950f54.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2868 c6ad494543f252a8b8e7caa86c950f54.exe 2868 c6ad494543f252a8b8e7caa86c950f54.exe