Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 07:43
Behavioral task
behavioral1
Sample
b8fae131ea97a24e1e0ff759c6a316b4d8d864897cdc172184336d33078832fc.exe
Resource
win7-20240508-en
2 signatures
150 seconds
General
-
Target
b8fae131ea97a24e1e0ff759c6a316b4d8d864897cdc172184336d33078832fc.exe
-
Size
9.0MB
-
MD5
12ad6142c9b625a1f23834e617594c82
-
SHA1
18c63c43f51ad1185387c6bbaa00481dcfc2b9d9
-
SHA256
b8fae131ea97a24e1e0ff759c6a316b4d8d864897cdc172184336d33078832fc
-
SHA512
37075b58126e89659d863f37f0c148a2e61b6f911f63266a8bb3833cb927769550a77931471e85399e19ba2ad4686dafa8cbbcf2adbf93c19fc37113f321d2ae
-
SSDEEP
196608:nSJcDKlFBqkwDxURK8vyqByLdlf3hRQIgLKN:SODKlFBqHayOclfhRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2892 b8fae131ea97a24e1e0ff759c6a316b4d8d864897cdc172184336d33078832fc.exe 2892 b8fae131ea97a24e1e0ff759c6a316b4d8d864897cdc172184336d33078832fc.exe