Behavioral task
behavioral1
Sample
b412dd132cb21a0d4d7bb622c6fe49f9e6c5c934201815d570db774ac80194f5.exe
Resource
win7-20240903-en
General
-
Target
b412dd132cb21a0d4d7bb622c6fe49f9e6c5c934201815d570db774ac80194f5
-
Size
29KB
-
MD5
d0038532ae6cec64be83bc19d0b8f695
-
SHA1
17a23380f80068d15ebc014cb2b1748bb45fb5c1
-
SHA256
b412dd132cb21a0d4d7bb622c6fe49f9e6c5c934201815d570db774ac80194f5
-
SHA512
af269471f7093445fb05bc6d6d185f9e48d0666674a3de50c4217757d3fdf39b067668bf2ca37eac91d5cb203c3ce3d4d634661e470d84d12c80c332344503ea
-
SSDEEP
384:piY/4mcwYPSNOjKjg11+rVlOxxtNP97kJkgQ8pwIIumVbgORBprjlJZpTJ3uPbHO:piWWjjKjrOFgwItmVsOlr1B+90B
Malware Config
Signatures
-
Detect Poverty Stealer Payload 1 IoCs
Processes:
resource yara_rule sample family_povertystealer -
Povertystealer family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b412dd132cb21a0d4d7bb622c6fe49f9e6c5c934201815d570db774ac80194f5
Files
-
b412dd132cb21a0d4d7bb622c6fe49f9e6c5c934201815d570db774ac80194f5.exe windows:5 windows x86 arch:x86
f63e2b20da57bba52ad3b39011a8e8d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForMultipleObjects
GetUserDefaultUILanguage
InitializeCriticalSectionAndSpinCount
CreateMutexA
Sleep
GetLastError
CloseHandle
GetSystemInfo
CreateThread
DeleteCriticalSection
ExitProcess
GlobalMemoryStatusEx
HeapFree
GetModuleFileNameW
HeapReAlloc
IsDBCSLeadByte
HeapAlloc
GetProcessHeap
WideCharToMultiByte
GetCurrentProcess
VirtualAlloc
GetFileAttributesW
DuplicateHandle
GetModuleHandleA
OpenProcess
LoadLibraryA
GetProcAddress
IsWow64Process
LeaveCriticalSection
MultiByteToWideChar
EnterCriticalSection
user32
ReleaseDC
EnumDisplayDevicesA
GetKeyboardLayoutList
GetSystemMetrics
advapi32
GetCurrentHwProfileA
crypt32
CryptProtectData
urlmon
ObtainUserAgentString
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ