General
-
Target
unnamed 2_3.9.8.53.vir
-
Size
116KB
-
Sample
200719-y338a6l5ns
-
MD5
7a86f267a4b481b4c8c46536c2e8dfc7
-
SHA1
deb9946fdc2dc1ed2ae48c1492e0b26a0bfdf54c
-
SHA256
7782918de66454c18112d62adba35e71fcfa0fe360676a5bac52453d5e05e17e
-
SHA512
ceab1ce6b13b3c779d98e02196039cf25a56824fded70514db34116d8aa40c9c1e34266a7cf0ca67e90f5c7b8a5c796d2eebc775d8177ee6a658c9504ba86244
Static task
static1
Behavioral task
behavioral1
Sample
unnamed 2_3.9.8.53.vir.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
unnamed 2_3.9.8.53.vir.exe
Resource
win10
Malware Config
Targets
-
-
Target
unnamed 2_3.9.8.53.vir
-
Size
116KB
-
MD5
7a86f267a4b481b4c8c46536c2e8dfc7
-
SHA1
deb9946fdc2dc1ed2ae48c1492e0b26a0bfdf54c
-
SHA256
7782918de66454c18112d62adba35e71fcfa0fe360676a5bac52453d5e05e17e
-
SHA512
ceab1ce6b13b3c779d98e02196039cf25a56824fded70514db34116d8aa40c9c1e34266a7cf0ca67e90f5c7b8a5c796d2eebc775d8177ee6a658c9504ba86244
Score8/10-
Executes dropped EXE
-
Loads dropped DLL
-
Reads user/profile data of web browsers
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application
-