Analysis
-
max time kernel
129s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
submitted
28/05/2024, 05:12
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
de36bc2bfc3c67820ebd75c912fadc3d.exe
Resource
win7-20240221-en
1 signatures
150 seconds
General
-
Target
de36bc2bfc3c67820ebd75c912fadc3d.exe
-
Size
20KB
-
MD5
de36bc2bfc3c67820ebd75c912fadc3d
-
SHA1
38bd51e1052ae5bede5293827e87d6f494b204c8
-
SHA256
2a5083d6e55f5cb56764fc4ed7ad082a0ef75a908ed03132178cc80f802c3d16
-
SHA512
efbc8a797e95f00c142c4c02c2f3faf4f46fabcdcd1a99d81df7581244a22f0b81f846d15de3b5f4b6d323deff555fd569db57aff3171ffebf27c03e4d53e6ef
-
SSDEEP
384:5QpiPUjq7B0CiUAxIAtlYxJ4JVB00rXMSKRC:1PUu7cUyTYOvrX3
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de36bc2bfc3c67820ebd75c912fadc3d.exe