General
-
Target
cS7il0zOGtdU05K.exe
-
Size
364KB
-
Sample
200712-ygf87577c2
-
MD5
b0cac1cdd3c9ab7d332811850ddd8ab9
-
SHA1
750deac873706d16c1180ac9c3eda6f435828c3e
-
SHA256
5300a0a0ca9bc1ac90ad1543fe3a1687db23b8f05194f86263938c57e0503b84
-
SHA512
ebf73440a56091edacee8f04eb61f7aba66f5ca024bb3a10937eb41462146ab48295a9419e0e44fc5c5ec47affa0baf212555411a5f3f09ca9a946e20c3372fc
Static task
static1
Behavioral task
behavioral1
Sample
cS7il0zOGtdU05K.exe
Resource
win7
Behavioral task
behavioral2
Sample
cS7il0zOGtdU05K.exe
Resource
win10v200430
Malware Config
Targets
-
-
Target
cS7il0zOGtdU05K.exe
-
Size
364KB
-
MD5
b0cac1cdd3c9ab7d332811850ddd8ab9
-
SHA1
750deac873706d16c1180ac9c3eda6f435828c3e
-
SHA256
5300a0a0ca9bc1ac90ad1543fe3a1687db23b8f05194f86263938c57e0503b84
-
SHA512
ebf73440a56091edacee8f04eb61f7aba66f5ca024bb3a10937eb41462146ab48295a9419e0e44fc5c5ec47affa0baf212555411a5f3f09ca9a946e20c3372fc
Score7/10-
Deletes itself
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run entry to start application
-
Suspicious use of SetThreadContext
-