General
-
Target
jaconfager.exe
-
Size
29KB
-
MD5
b53fe4fa46ed758b04b4425fa2028882
-
SHA1
c3f4fc1b41df2e77de4cc9c6bb1d7774db4bf2fa
-
SHA256
dd4ed2efdaf0c829b47f10a7b3644bda24a4a72786e6f23ad38657bd4858a539
-
SHA512
91a112448d164347caed679b1fe981b938f1485c37f8ea7c1d658dd0931cd3aa730d703cdc66d6fa268d8b68c50ddee93d4ff81e25096207c9478861ae123fa9
-
SSDEEP
384:piY/4mcwYPSNOjKjg11+rVlOxxtNP97kJkgQ8pwIIumVbgORBprjlJZpTJ3uPbHx:piWWjjKjrOFgwItmVsOlr1B+9F
Malware Config
Signatures
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule sample family_povertystealer -
Povertystealer family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource jaconfager.exe
Files
-
jaconfager.exe.exe windows:5 windows x86 arch:x86
f63e2b20da57bba52ad3b39011a8e8d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForMultipleObjects
GetUserDefaultUILanguage
InitializeCriticalSectionAndSpinCount
CreateMutexA
Sleep
GetLastError
CloseHandle
GetSystemInfo
CreateThread
DeleteCriticalSection
ExitProcess
GlobalMemoryStatusEx
HeapFree
GetModuleFileNameW
HeapReAlloc
IsDBCSLeadByte
HeapAlloc
GetProcessHeap
WideCharToMultiByte
GetCurrentProcess
VirtualAlloc
GetFileAttributesW
DuplicateHandle
GetModuleHandleA
OpenProcess
LoadLibraryA
GetProcAddress
IsWow64Process
LeaveCriticalSection
MultiByteToWideChar
EnterCriticalSection
user32
ReleaseDC
EnumDisplayDevicesA
GetKeyboardLayoutList
GetSystemMetrics
advapi32
GetCurrentHwProfileA
crypt32
CryptProtectData
urlmon
ObtainUserAgentString
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 764B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ