Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 06:21
Behavioral task
behavioral1
Sample
宇宙至尊白蛋[盾].exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
宇宙至尊白蛋[盾].exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cmd.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
cmd.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
[].exe
Resource
win7-20240903-en
General
-
Target
[].exe
-
Size
9.1MB
-
MD5
c8250af6634fc8849b9f7ce2e551cd48
-
SHA1
82c2cd10b575a9117fc51556d3bd5ade091461ce
-
SHA256
06bc11cf49d62eb1c179fde516002e081593874fe13e88c58e13b6f5f18740c9
-
SHA512
1b0f9a964cab7ff4b362c5a5d79f69b94f41326582724bf2465598a512667f6b7639744131bb0dc06df0230e0a7f94090767c9591476d972e09ac0c542d4a610
-
SSDEEP
196608:N0JcDKlFBqZcPz5jGVARK8OSqY4i5KPa/hdHDRQIgLKN:CODKlFBqa99qs5x/jHDRQIG2
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [].exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3100 [].exe 3100 [].exe