Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22-07-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe
Resource
win10-20240404-en
General
-
Target
27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe
-
Size
9.5MB
-
MD5
7e10bd91154eca00420a74abb9967915
-
SHA1
4b59eec6aee1919dd17df3c4809689c5265a7077
-
SHA256
27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479
-
SHA512
58153a0f33a2d0dc1a6c033a6a67ef3ff5f4714a0911cfc4aa008468e714d0d771748ab61346ad56d2652a7c0f6b44937915d84b0a2bdad2794919bbfae13cdb
-
SSDEEP
196608:VzOw9OJLCt1+xIKDYd23u9tUebJSHZYuw7hewLK50aBOS:V9Toe9DSHZ+hZLe3OS
Malware Config
Signatures
-
Detect Poverty Stealer Payload 4 IoCs
resource yara_rule behavioral1/memory/2548-5-0x0000000000F20000-0x0000000001DDD000-memory.dmp family_povertystealer behavioral1/memory/2548-8-0x0000000000F20000-0x0000000001DDD000-memory.dmp family_povertystealer behavioral1/memory/2548-9-0x0000000000F20000-0x0000000001DDD000-memory.dmp family_povertystealer behavioral1/memory/2548-10-0x0000000000F20000-0x0000000001DDD000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2548 27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe