General

  • Target

    40e7b75207030fb9603977b5b4fb3a8e67f73a243f004cc6eac07114f2ae061a

  • Size

    2.1MB

  • MD5

    d8d0152360158b3cd8c1ce65e27f7d8a

  • SHA1

    0d72293960425d92979e1100e57f413a3f4394a5

  • SHA256

    40e7b75207030fb9603977b5b4fb3a8e67f73a243f004cc6eac07114f2ae061a

  • SHA512

    5cb41d6f71c3fc57814d72a738388573580f6e10fbef8f0f695030e8e761b2155ceb77ad1b7829f699c4df6909b682deece5d967c427f59d63de44e985f7e4a5

  • SSDEEP

    24576:ThS3u9fS4UlbZNd6CNUBZZP4qTkBCudIH5aPUoqFiLP:TqmMBhqkIH5aPUViD

Score
10/10

Malware Config

Signatures

  • Detects executables containing SQL queries to confidential data stores. Observed in infostealers 1 IoCs
  • Detects executables containing URLs to raw contents of a Github gist 1 IoCs
  • Detects executables packed with Dotfuscator 1 IoCs
  • Detects executables referencing Windows vault credential objects. Observed in infostealers 1 IoCs
  • Detects executables referencing many IR and analysis tools 1 IoCs
  • Detects executables referencing many confidential data stores found in browsers, mail clients, cryptocurreny wallets, etc. Observed in information stealers 1 IoCs
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 40e7b75207030fb9603977b5b4fb3a8e67f73a243f004cc6eac07114f2ae061a
    .exe windows:4 windows x86 arch:x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections