Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24-01-2025 01:35
Static task
static1
Behavioral task
behavioral1
Sample
80a13e448f8b3bae3538712a7caea309e7cd6f24151becf366a8291cb24368be.exe
Resource
win7-20241010-en
General
-
Target
80a13e448f8b3bae3538712a7caea309e7cd6f24151becf366a8291cb24368be.exe
-
Size
2.8MB
-
MD5
cf48ada956599fbeb1e439e4e76c6146
-
SHA1
50b5cbc9cbb0a3c402f9a781eb66bc7c66aad5b9
-
SHA256
80a13e448f8b3bae3538712a7caea309e7cd6f24151becf366a8291cb24368be
-
SHA512
823bbd740a48d07aedbb9753d9e7c9affe05be984d8d418451e35512dd5b0c7369521503587989f908c8320a80fe94198195b78ae9baf0c1cf1dfb2c6a549a5b
-
SSDEEP
49152:3U0lOOUe8FdOIyVX65rcGDnmOOGG+o6MjxfeuDZvf5tn:EoLUDnOiQ/
Malware Config
Signatures
-
Detect Poverty Stealer Payload 4 IoCs
resource yara_rule behavioral1/memory/2776-0-0x0000000000020000-0x000000000002A000-memory.dmp family_povertystealer behavioral1/memory/2776-5-0x0000000000020000-0x000000000002A000-memory.dmp family_povertystealer behavioral1/memory/2776-7-0x0000000000020000-0x000000000002A000-memory.dmp family_povertystealer behavioral1/memory/2776-9-0x0000000000020000-0x000000000002A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 80a13e448f8b3bae3538712a7caea309e7cd6f24151becf366a8291cb24368be.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2776 80a13e448f8b3bae3538712a7caea309e7cd6f24151becf366a8291cb24368be.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80a13e448f8b3bae3538712a7caea309e7cd6f24151becf366a8291cb24368be.exe"C:\Users\Admin\AppData\Local\Temp\80a13e448f8b3bae3538712a7caea309e7cd6f24151becf366a8291cb24368be.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2776