General
-
Target
kins_3.1.0.0.vir
-
Size
213KB
-
Sample
200719-nld413v3zx
-
MD5
23877e74b44452778b56855cdf83d9b9
-
SHA1
4790c8147c74f199481e792493c43ffd1f823e5f
-
SHA256
798c6be4ea73c2d7c936f0d86b804b636188f249fd813f62722565923c158e0b
-
SHA512
cdd6af8e94e7739d4d2d5e0f566da2da94b4a9415bf709a08154a269761f701462d557e2cb79f87ad0cbe25ef6a6e399295dd4c42ed96d2d0ed02f8cfcac5237
Static task
static1
Behavioral task
behavioral1
Sample
kins_3.1.0.0.vir.exe
Resource
win7
Behavioral task
behavioral2
Sample
kins_3.1.0.0.vir.exe
Resource
win10v200430
Malware Config
Targets
-
-
Target
kins_3.1.0.0.vir
-
Size
213KB
-
MD5
23877e74b44452778b56855cdf83d9b9
-
SHA1
4790c8147c74f199481e792493c43ffd1f823e5f
-
SHA256
798c6be4ea73c2d7c936f0d86b804b636188f249fd813f62722565923c158e0b
-
SHA512
cdd6af8e94e7739d4d2d5e0f566da2da94b4a9415bf709a08154a269761f701462d557e2cb79f87ad0cbe25ef6a6e399295dd4c42ed96d2d0ed02f8cfcac5237
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-