Resubmissions
19/07/2020, 19:03
200719-cs9j3nv856 7Analysis
-
max time kernel
147s -
max time network
42s -
platform
windows7_x64 -
resource
win7 -
submitted
19/07/2020, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
3b65dbd9b05019aae658c21f7fcb18dd29eea1555cc26c3fa12b9aa74ea55b88.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
3b65dbd9b05019aae658c21f7fcb18dd29eea1555cc26c3fa12b9aa74ea55b88.bin.exe
Resource
win10v200430
General
-
Target
3b65dbd9b05019aae658c21f7fcb18dd29eea1555cc26c3fa12b9aa74ea55b88.bin.exe
-
Size
344KB
-
MD5
edd31ea8252b9105a928419e81bf1049
-
SHA1
1c1acfee6a97f17f7a1a65fcb7eff654a5ce53f6
-
SHA256
3b65dbd9b05019aae658c21f7fcb18dd29eea1555cc26c3fa12b9aa74ea55b88
-
SHA512
52bbf9800d2b99ae2e1a862abebe597a52cf2a0b3c458b34987ffaa38bba0c6b14d125d6172544851f1d04e1dc5028ad8c10de95a73461f9ddbbaec85997a6b7
Malware Config
Signatures
-
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Vhost.exe 3b65dbd9b05019aae658c21f7fcb18dd29eea1555cc26c3fa12b9aa74ea55b88.bin.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Vhost.exe 3b65dbd9b05019aae658c21f7fcb18dd29eea1555cc26c3fa12b9aa74ea55b88.bin.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.