Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17280510291c8c4b14cfdc13ed55b84a8f19edbb1b8c49ab6ac884e9410d7eb616a06fbee4438.dat-decoded.exe

Overview

General Information

Sample name:17280510291c8c4b14cfdc13ed55b84a8f19edbb1b8c49ab6ac884e9410d7eb616a06fbee4438.dat-decoded.exe
Analysis ID:1525916
MD5:1d639e72fa395807b75244d37992e535
SHA1:d25cef942f2167a7b403a3e9a8b889dd55c68ea7
SHA256:7472a41d7e387fb7bb36e5cb682caf2cedfbc642b10eb7e727147102ddb3e938
Tags:base64-decodedexeuser-abuse_ch
Infos:
Errors
  • No process behavior to analyse as no analysis process or sample was found
  • Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.

Detection

Poverty Stealer
Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Yara detected Poverty Stealer

Classification

No configs have been found
SourceRuleDescriptionAuthorStrings
17280510291c8c4b14cfdc13ed55b84a8f19edbb1b8c49ab6ac884e9410d7eb616a06fbee4438.dat-decoded.exeJoeSecurity_PovertyStealerYara detected Poverty StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results
    Source: classification engineClassification label: mal48.troj.winEXE@0/0@0/0

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: 17280510291c8c4b14cfdc13ed55b84a8f19edbb1b8c49ab6ac884e9410d7eb616a06fbee4438.dat-decoded.exe, type: SAMPLE

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: 17280510291c8c4b14cfdc13ed55b84a8f19edbb1b8c49ab6ac884e9410d7eb616a06fbee4438.dat-decoded.exe, type: SAMPLE
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping1
    System Information Discovery
    Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    17280510291c8c4b14cfdc13ed55b84a8f19edbb1b8c49ab6ac884e9410d7eb616a06fbee4438.dat-decoded.exe3%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    No contacted domains info
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1525916
    Start date and time:2024-10-04 16:16:54 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 1m 36s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:1
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:17280510291c8c4b14cfdc13ed55b84a8f19edbb1b8c49ab6ac884e9410d7eb616a06fbee4438.dat-decoded.exe
    Detection:MAL
    Classification:mal48.troj.winEXE@0/0@0/0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Unable to launch sample, stop analysis
    • No process behavior to analyse as no analysis process or sample was found
    • Corrupt sample or wrongly selected analyzer. Details: The image file %1 is valid, but is for a machine type other than the current machine.
    • Exclude process from analysis (whitelisted): dllhost.exe
    • VT rate limit hit for: 17280510291c8c4b14cfdc13ed55b84a8f19edbb1b8c49ab6ac884e9410d7eb616a06fbee4438.dat-decoded.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:MS-DOS executable
    Entropy (8bit):6.550297337206876
    TrID:
    • Generic Win/DOS Executable (2004/3) 49.94%
    • DOS Executable Generic (2002/1) 49.89%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.17%
    File name:17280510291c8c4b14cfdc13ed55b84a8f19edbb1b8c49ab6ac884e9410d7eb616a06fbee4438.dat-decoded.exe
    File size:32'008 bytes
    MD5:1d639e72fa395807b75244d37992e535
    SHA1:d25cef942f2167a7b403a3e9a8b889dd55c68ea7
    SHA256:7472a41d7e387fb7bb36e5cb682caf2cedfbc642b10eb7e727147102ddb3e938
    SHA512:8ac7936fc2b236c00ca2e48909f92b03c172e5988687177fec5f57c85eb07f15f294cf50989e73790f780abd7e32315883ce4bf6112206e84ecc193949ae8cae
    SSDEEP:384:BO0AJeLO0+82N8ZPMXa1VxT94/aDhHuFBnAu0QAqs99iGVcsO3ndDYhjp2XPbH50:B5LxhZPMoTiCVlV99iGV9Otqw/9gO
    TLSH:81E28D56CAE0D1B3D4D30E71736BEE679CFF756202180C932BAE48B4189AE40B6956C7
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........M...,}..,}..,}..qC.:...,}..T...,}..,|..,}..qt..,}..qp.N...,}.Rich.,}.........PE..L......f.................`...........".......
    Icon Hash:00928e8e8686b000
    No network behavior found
    No statistics
    No system behavior
    No disassembly