Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
29-07-2024 12:00
Static task
static1
Behavioral task
behavioral1
Sample
Binance.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Binance.exe
Resource
win10v2004-20240709-en
General
-
Target
Binance.exe
-
Size
470KB
-
MD5
1b54ae4ceffb558dfbe1f0acef0a1f66
-
SHA1
fb58101496693ed1e235f5a9aabbe54474383b83
-
SHA256
90fd1c4de7f75213f1f37ecd7b4b8729e844f6e2874af5d7e55e69a04506bbaf
-
SHA512
d6482554ca5bb4e3c6ad8d1e79db4dd7df29ad64d426667a8d652f8891d6b218bfd934e9c9e57c71c6ba7756d23387b66d82498778787a53e15710762f08b0e1
-
SSDEEP
6144:0Jep2sd6Eto9Eu9P/zpTH+McvYBgB5V5TtiAF4RpZdlyg4gCOWOc6vRom:0Jc24S95+neAV5xHs748HvRom
Malware Config
Signatures
-
Detect Poverty Stealer Payload 7 IoCs
resource yara_rule behavioral2/memory/4980-6-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4980-8-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4980-9-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4980-10-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4980-13-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4980-14-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4980-15-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 35 bitbucket.org 36 bitbucket.org -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2240 set thread context of 4980 2240 Binance.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Binance.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CasPol.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2240 wrote to memory of 4980 2240 Binance.exe 95 PID 2240 wrote to memory of 4980 2240 Binance.exe 95 PID 2240 wrote to memory of 4980 2240 Binance.exe 95 PID 2240 wrote to memory of 4980 2240 Binance.exe 95 PID 2240 wrote to memory of 4980 2240 Binance.exe 95 PID 2240 wrote to memory of 4980 2240 Binance.exe 95 PID 2240 wrote to memory of 4980 2240 Binance.exe 95 PID 2240 wrote to memory of 4980 2240 Binance.exe 95 PID 2240 wrote to memory of 4980 2240 Binance.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Binance.exe"C:\Users\Admin\AppData\Local\Temp\Binance.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4980
-