Analysis
-
max time kernel
126s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
05/04/2025, 12:19
General
-
Target
jaconfager.exe
-
Size
29KB
-
MD5
b53fe4fa46ed758b04b4425fa2028882
-
SHA1
c3f4fc1b41df2e77de4cc9c6bb1d7774db4bf2fa
-
SHA256
dd4ed2efdaf0c829b47f10a7b3644bda24a4a72786e6f23ad38657bd4858a539
-
SHA512
91a112448d164347caed679b1fe981b938f1485c37f8ea7c1d658dd0931cd3aa730d703cdc66d6fa268d8b68c50ddee93d4ff81e25096207c9478861ae123fa9
-
SSDEEP
384:piY/4mcwYPSNOjKjg11+rVlOxxtNP97kJkgQ8pwIIumVbgORBprjlJZpTJ3uPbHx:piWWjjKjrOFgwItmVsOlr1B+9F
Malware Config
Signatures
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jaconfager.exe