Analysis
-
max time kernel
93s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16-07-2024 12:01
Behavioral task
behavioral1
Sample
0bb47290ac45642ac44a00846eda74e2.exe
Resource
win7-20240704-en
General
-
Target
0bb47290ac45642ac44a00846eda74e2.exe
-
Size
62KB
-
MD5
0bb47290ac45642ac44a00846eda74e2
-
SHA1
7aa599e8015acce39808380c98270fbb62eecb73
-
SHA256
b6dcb01c7c91f76249539cfdd025d171ebbc37c2e19842b3f1d13122200de356
-
SHA512
dd6f7beb82844543993e9e29caad6205ef9d28839519e78eb9b30d8754b3818a7f3859f76685a56771826cace39f42631af3248db44fa250c5e557f6e4727f09
-
SSDEEP
1536:X2FpiG7JknoDR58tXwL6cgue6rsgE8PU6amwqvM5bGAgCPKOg1G8rnTRhx:X2FpiGNkgE8PU6aIvM5bGRMC/Lx
Malware Config
Extracted
asyncrat
AWS | 3Losh
Scar 77
scar77747.duckdns.org:6606
scar77747.duckdns.org:7707
scar77747.duckdns.org:8808
Alx_alx
-
delay
3
-
install
false
-
install_folder
%AppData%
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1572 0bb47290ac45642ac44a00846eda74e2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1572 0bb47290ac45642ac44a00846eda74e2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1572 0bb47290ac45642ac44a00846eda74e2.exe