Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2025, 15:23
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20250217-en
General
-
Target
file.exe
-
Size
436KB
-
MD5
c3ed584247dd414bd9d9b0ae76ed283e
-
SHA1
8031d42ba060bb194315f1df1e937536f57557d4
-
SHA256
448c63095e85a73417068e6efe7f2060a8d52f15f904a9ebab89748d717241ca
-
SHA512
c57bcf86875b455eeaef9fcd1ef417af8305e679e4aa0facab01798117a229fa438b7a4cc0e731c5f54ed8466759f8f94ec4677c0c112121bbc32f95de7f367d
-
SSDEEP
12288:aIJQ/s2kiatVPnIpbWiJ621POPAANU/rJ:nBnIpnJhdQAANerJ
Malware Config
Signatures
-
Detect Poverty Stealer Payload 5 IoCs
resource yara_rule behavioral2/memory/4900-1-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4900-3-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4900-5-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4900-7-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/4900-8-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 672 set thread context of 4900 672 file.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 672 wrote to memory of 4900 672 file.exe 87 PID 672 wrote to memory of 4900 672 file.exe 87 PID 672 wrote to memory of 4900 672 file.exe 87 PID 672 wrote to memory of 4900 672 file.exe 87 PID 672 wrote to memory of 4900 672 file.exe 87 PID 672 wrote to memory of 4900 672 file.exe 87 PID 672 wrote to memory of 4900 672 file.exe 87 PID 672 wrote to memory of 4900 672 file.exe 87 PID 672 wrote to memory of 4900 672 file.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"2⤵
- System Location Discovery: System Language Discovery
PID:4900
-