General

  • Target

    edade6616334f3d313ac3ea7c3e432d8d9461cddad8e2ec3a94ffdc6e336a94e

  • Size

    3.1MB

  • Sample

    210409-47gbczmqex

  • MD5

    1ec7d022a565c10ff86d847fea8136da

  • SHA1

    89017b817427308ae42d3cd99f6845e97805595d

  • SHA256

    edade6616334f3d313ac3ea7c3e432d8d9461cddad8e2ec3a94ffdc6e336a94e

  • SHA512

    aaf0f90b5b3c094103434c73b90fb5fe725da468d24e2d31acd9e08635177ee0b133adaf32b1ce77af5018a49fe25f6106299f7c12ad4626b5ef05cb283889c0

Malware Config

Targets

    • Target

      edade6616334f3d313ac3ea7c3e432d8d9461cddad8e2ec3a94ffdc6e336a94e

    • Size

      3.1MB

    • MD5

      1ec7d022a565c10ff86d847fea8136da

    • SHA1

      89017b817427308ae42d3cd99f6845e97805595d

    • SHA256

      edade6616334f3d313ac3ea7c3e432d8d9461cddad8e2ec3a94ffdc6e336a94e

    • SHA512

      aaf0f90b5b3c094103434c73b90fb5fe725da468d24e2d31acd9e08635177ee0b133adaf32b1ce77af5018a49fe25f6106299f7c12ad4626b5ef05cb283889c0

    • Drops file in Drivers directory

    • Modifies extensions of user files

      Ransomware generally changes the extension on encrypted files.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Collection

Data from Local System

1
T1005

Tasks