Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13/03/2025, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20250217-en
General
-
Target
file.exe
-
Size
436KB
-
MD5
c3ed584247dd414bd9d9b0ae76ed283e
-
SHA1
8031d42ba060bb194315f1df1e937536f57557d4
-
SHA256
448c63095e85a73417068e6efe7f2060a8d52f15f904a9ebab89748d717241ca
-
SHA512
c57bcf86875b455eeaef9fcd1ef417af8305e679e4aa0facab01798117a229fa438b7a4cc0e731c5f54ed8466759f8f94ec4677c0c112121bbc32f95de7f367d
-
SSDEEP
12288:aIJQ/s2kiatVPnIpbWiJ621POPAANU/rJ:nBnIpnJhdQAANerJ
Malware Config
Signatures
-
Detect Poverty Stealer Payload 7 IoCs
resource yara_rule behavioral1/memory/2028-4-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2028-5-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2028-12-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2028-10-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2028-8-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2028-14-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral1/memory/2028-15-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 108 set thread context of 2028 108 file.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 108 wrote to memory of 636 108 file.exe 29 PID 108 wrote to memory of 636 108 file.exe 29 PID 108 wrote to memory of 636 108 file.exe 29 PID 108 wrote to memory of 636 108 file.exe 29 PID 108 wrote to memory of 2028 108 file.exe 30 PID 108 wrote to memory of 2028 108 file.exe 30 PID 108 wrote to memory of 2028 108 file.exe 30 PID 108 wrote to memory of 2028 108 file.exe 30 PID 108 wrote to memory of 2028 108 file.exe 30 PID 108 wrote to memory of 2028 108 file.exe 30 PID 108 wrote to memory of 2028 108 file.exe 30 PID 108 wrote to memory of 2028 108 file.exe 30 PID 108 wrote to memory of 2028 108 file.exe 30 PID 108 wrote to memory of 2028 108 file.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2028
-