Malware Analysis Report

2024-10-19 02:41

Sample ID 240406-txhpqaeh85
Target 20c65c429a3d149bc95caaece5bf8986.exe
SHA256 448a14d6ee35da26c5659cf4253d4bcd97737ab502c6195b65d3e14451ab3e0d
Tags
povertystealer spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

448a14d6ee35da26c5659cf4253d4bcd97737ab502c6195b65d3e14451ab3e0d

Threat Level: Known bad

The file 20c65c429a3d149bc95caaece5bf8986.exe was found to be: Known bad.

Malicious Activity Summary

povertystealer spyware stealer

Poverty Stealer

Detect Poverty Stealer Payload

Reads user/profile data of web browsers

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-06 16:26

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-06 16:26

Reported

2024-04-06 16:28

Platform

win7-20240221-en

Max time kernel

119s

Max time network

125s

Command Line

"C:\Users\Admin\AppData\Local\Temp\20c65c429a3d149bc95caaece5bf8986.exe"

Signatures

Detect Poverty Stealer Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Poverty Stealer

stealer povertystealer

Reads user/profile data of web browsers

spyware stealer

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\20c65c429a3d149bc95caaece5bf8986.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\20c65c429a3d149bc95caaece5bf8986.exe

"C:\Users\Admin\AppData\Local\Temp\20c65c429a3d149bc95caaece5bf8986.exe"

Network

Country Destination Domain Proto
DE 146.70.169.164:2227 tcp

Files

memory/2160-0-0x00000000000F0000-0x00000000000F1000-memory.dmp

memory/2160-2-0x00000000010C0000-0x0000000001BB5000-memory.dmp

memory/2160-3-0x00000000000F0000-0x00000000000F1000-memory.dmp

memory/2160-6-0x00000000010C0000-0x0000000001BB5000-memory.dmp

memory/2160-7-0x0000000000100000-0x0000000000101000-memory.dmp

memory/2160-5-0x00000000000F0000-0x00000000000F1000-memory.dmp

memory/2160-11-0x0000000000100000-0x0000000000101000-memory.dmp

memory/2160-9-0x0000000000100000-0x0000000000101000-memory.dmp

memory/2160-14-0x0000000000250000-0x0000000000251000-memory.dmp

memory/2160-16-0x0000000000250000-0x0000000000251000-memory.dmp

memory/2160-19-0x0000000000260000-0x0000000000261000-memory.dmp

memory/2160-21-0x0000000000260000-0x0000000000261000-memory.dmp

memory/2160-24-0x0000000000270000-0x0000000000271000-memory.dmp

memory/2160-26-0x0000000000270000-0x0000000000271000-memory.dmp

memory/2160-29-0x0000000000280000-0x0000000000281000-memory.dmp

memory/2160-31-0x0000000000280000-0x0000000000281000-memory.dmp

memory/2160-36-0x00000000010C0000-0x0000000001BB5000-memory.dmp

memory/2160-37-0x0000000000290000-0x0000000000291000-memory.dmp

memory/2160-38-0x00000000010C0000-0x0000000001BB5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-06 16:26

Reported

2024-04-06 16:28

Platform

win10v2004-20240226-en

Max time kernel

92s

Max time network

94s

Command Line

"C:\Users\Admin\AppData\Local\Temp\20c65c429a3d149bc95caaece5bf8986.exe"

Signatures

Detect Poverty Stealer Payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Poverty Stealer

stealer povertystealer

Reads user/profile data of web browsers

spyware stealer

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\20c65c429a3d149bc95caaece5bf8986.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\20c65c429a3d149bc95caaece5bf8986.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\20c65c429a3d149bc95caaece5bf8986.exe

"C:\Users\Admin\AppData\Local\Temp\20c65c429a3d149bc95caaece5bf8986.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 154.239.44.20.in-addr.arpa udp
US 8.8.8.8:53 74.192.122.92.in-addr.arpa udp
US 8.8.8.8:53 64.159.190.20.in-addr.arpa udp
DE 146.70.169.164:2227 tcp
US 8.8.8.8:53 196.249.167.52.in-addr.arpa udp
US 8.8.8.8:53 164.169.70.146.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 18.31.95.13.in-addr.arpa udp
US 8.8.8.8:53 28.143.109.104.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 30.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 240.221.184.93.in-addr.arpa udp

Files

memory/2280-1-0x0000000002EB0000-0x0000000002EB1000-memory.dmp

memory/2280-0-0x0000000002D90000-0x0000000002D91000-memory.dmp

memory/2280-4-0x0000000002EF0000-0x0000000002EF1000-memory.dmp

memory/2280-3-0x0000000000290000-0x0000000000D85000-memory.dmp

memory/2280-2-0x0000000002EE0000-0x0000000002EE1000-memory.dmp

memory/2280-6-0x0000000000290000-0x0000000000D85000-memory.dmp

memory/2280-7-0x0000000002F10000-0x0000000002F11000-memory.dmp

memory/2280-5-0x0000000002F00000-0x0000000002F01000-memory.dmp

memory/2280-12-0x0000000000290000-0x0000000000D85000-memory.dmp

memory/2280-13-0x0000000002F20000-0x0000000002F21000-memory.dmp

memory/2280-14-0x0000000000290000-0x0000000000D85000-memory.dmp