Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-08-2024 12:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
b5e1155b129193a8ee7c1d6f6e7abf47398be9d76a715f15f15aeca33424376c.bin.exe
Resource
win7-20240708-en
windows7-x64
1 signatures
150 seconds
General
-
Target
b5e1155b129193a8ee7c1d6f6e7abf47398be9d76a715f15f15aeca33424376c.bin.exe
-
Size
747KB
-
MD5
8fce866ef8da19d2653eefc890d8788a
-
SHA1
5214faded8b58510c6841accbcffee79e45c3233
-
SHA256
b5e1155b129193a8ee7c1d6f6e7abf47398be9d76a715f15f15aeca33424376c
-
SHA512
9e2ae381b9ca733c5f27aeb6cbbd3c99d169359c01bd0af66121f64d8c4a64757eae303087708a78dd83e769d9332ac80cd263ec589bcdceaee1b94b1e861a31
-
SSDEEP
12288:LLPmNbL1G0Qk81PgXf/qSBLb/cQ+sq7YvqffY+20j:LbmNs0Qk8i/qSBLb/cLcvQ
Malware Config
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5e1155b129193a8ee7c1d6f6e7abf47398be9d76a715f15f15aeca33424376c.bin.exe"C:\Users\Admin\AppData\Local\Temp\b5e1155b129193a8ee7c1d6f6e7abf47398be9d76a715f15f15aeca33424376c.bin.exe"1⤵PID:2112
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2204