Analysis
-
max time kernel
199s -
max time network
307s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
25-07-2024 22:35
Static task
static1
Behavioral task
behavioral1
Sample
27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe
Resource
win10-20240611-en
General
-
Target
27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe
-
Size
9.5MB
-
MD5
7e10bd91154eca00420a74abb9967915
-
SHA1
4b59eec6aee1919dd17df3c4809689c5265a7077
-
SHA256
27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479
-
SHA512
58153a0f33a2d0dc1a6c033a6a67ef3ff5f4714a0911cfc4aa008468e714d0d771748ab61346ad56d2652a7c0f6b44937915d84b0a2bdad2794919bbfae13cdb
-
SSDEEP
196608:VzOw9OJLCt1+xIKDYd23u9tUebJSHZYuw7hewLK50aBOS:V9Toe9DSHZ+hZLe3OS
Malware Config
Signatures
-
Detect Poverty Stealer Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4512-2-0x0000000001170000-0x000000000202D000-memory.dmp family_povertystealer behavioral2/memory/4512-4-0x0000000001170000-0x000000000202D000-memory.dmp family_povertystealer behavioral2/memory/4512-6-0x0000000001170000-0x000000000202D000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exepid Process 4512 27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe 4512 27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe"C:\Users\Admin\AppData\Local\Temp\27ae0c25472fe22bbf6b33c2abc2ff061a540ccee039cbcda77c39ab4f0b9479.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4512