Analysis
-
max time kernel
97s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/09/2024, 18:59 UTC
Static task
static1
Behavioral task
behavioral1
Sample
eb97052899bb8e9d32865a2b3269122252942286618387278279d792b13dfd72.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb97052899bb8e9d32865a2b3269122252942286618387278279d792b13dfd72.exe
Resource
win10v2004-20240802-en
General
-
Target
eb97052899bb8e9d32865a2b3269122252942286618387278279d792b13dfd72.exe
-
Size
8.5MB
-
MD5
8d53eb752c4c26795c3cc334c9a64611
-
SHA1
f1a3d4a4a1110d616ad82bdb64d98b011adc00c7
-
SHA256
eb97052899bb8e9d32865a2b3269122252942286618387278279d792b13dfd72
-
SHA512
f501f8eee32ec863aa061be6fe07e382e38adeaa20b110792310f457af4591dec289145a7f10b6aa5023d5143e773312c5c5a4c078286d8604feb689db288e99
-
SSDEEP
196608:qa+ZIGwdfbWgPfZ0nwsiBOCaepkvxEcBqc2xHFJLc04ylx40tk:mZIGwdfjhTsigHvxE9c2xH/crylx402
Malware Config
Signatures
-
An open source browser data exporter written in golang. 6 IoCs
resource yara_rule behavioral2/memory/3976-2-0x0000000000F30000-0x0000000002C5E000-memory.dmp family_hackbrowserdata behavioral2/memory/3976-3-0x0000000000F30000-0x0000000002C5E000-memory.dmp family_hackbrowserdata behavioral2/memory/3976-4-0x0000000000F30000-0x0000000002C5E000-memory.dmp family_hackbrowserdata behavioral2/memory/3976-5-0x0000000000F30000-0x0000000002C5E000-memory.dmp family_hackbrowserdata behavioral2/memory/3976-6-0x0000000000F30000-0x0000000002C5E000-memory.dmp family_hackbrowserdata behavioral2/memory/3976-74-0x0000000000F30000-0x0000000002C5E000-memory.dmp family_hackbrowserdata -
HackBrowserData
An open source golang web browser extractor.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 3976 eb97052899bb8e9d32865a2b3269122252942286618387278279d792b13dfd72.exe 3976 eb97052899bb8e9d32865a2b3269122252942286618387278279d792b13dfd72.exe
Processes
Network
-
Remote address:8.8.8.8:53Request8.8.8.8.in-addr.arpaIN PTRResponse8.8.8.8.in-addr.arpaIN PTRdnsgoogle
-
Remote address:8.8.8.8:53Request154.239.44.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request101.210.23.2.in-addr.arpaIN PTRResponse101.210.23.2.in-addr.arpaIN PTRa2-23-210-101deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request72.32.126.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request95.221.229.192.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request13.86.106.20.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request56.163.245.4.in-addr.arpaIN PTR
-
Remote address:8.8.8.8:53Request241.42.69.40.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request70.252.19.2.in-addr.arpaIN PTRResponse70.252.19.2.in-addr.arpaIN PTRa2-19-252-70deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request83.210.23.2.in-addr.arpaIN PTRResponse83.210.23.2.in-addr.arpaIN PTRa2-23-210-83deploystaticakamaitechnologiescom
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request29.243.111.52.in-addr.arpaIN PTR
-
66 B 90 B 1 1
DNS Request
8.8.8.8.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
154.239.44.20.in-addr.arpa
-
71 B 135 B 1 1
DNS Request
101.210.23.2.in-addr.arpa
-
71 B 157 B 1 1
DNS Request
72.32.126.40.in-addr.arpa
-
73 B 144 B 1 1
DNS Request
95.221.229.192.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
13.86.106.20.in-addr.arpa
DNS Request
13.86.106.20.in-addr.arpa
-
142 B 157 B 2 1
DNS Request
56.163.245.4.in-addr.arpa
DNS Request
56.163.245.4.in-addr.arpa
-
71 B 145 B 1 1
DNS Request
241.42.69.40.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
70.252.19.2.in-addr.arpa
-
70 B 133 B 1 1
DNS Request
83.210.23.2.in-addr.arpa
-
144 B 158 B 2 1
DNS Request
29.243.111.52.in-addr.arpa
DNS Request
29.243.111.52.in-addr.arpa
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b