Analysis
-
max time kernel
14s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 20:09
Behavioral task
behavioral1
Sample
b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe
Resource
win7-20241010-en
2 signatures
60 seconds
General
-
Target
b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe
-
Size
92KB
-
MD5
bb753230d9026d2da2efb09807a6548c
-
SHA1
739db2a0d1ff6218e80b9f966b7ac0a2503cf5f5
-
SHA256
b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe
-
SHA512
417a5ea1e4ab836720a2c32454d87d1bbd8dd36499d4ffb404bcced59566728debad9d5ef0d35251b69f66868175d20fdfae436ec338a6d128bdc3022e94b008
-
SSDEEP
1536:YhhW0YTGZWdVseJxaM9kraLdV2QkQ1TbPX8IHOCkIsI4ES0RNTh9E+JP19qkPIvL:+hzYTGWVvJ8f2v1TbPzuMsIFSYNThy+u
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2580 b16c54e8f2b836264a8f890d162935a37fb0ecfc1dcb12f9a700e7f99e324ffe.exe