General

  • Target

    42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b

  • Size

    577KB

  • Sample

    220415-fagbgshba4

  • MD5

    66f4f1384105ce7ee1636d34f2afb1c9

  • SHA1

    3f23d152cc7badf728dfd60f6baa5c861a500630

  • SHA256

    42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b

  • SHA512

    d854b736f4f5e21db59b784e18e08e6047c601946b80da26fea019ef3725ee8cf85f99fecfd05dc70dac295e38a55609593ce7ad9a16332713c6d0257f922368

Malware Config

Targets

    • Target

      42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b

    • Size

      577KB

    • MD5

      66f4f1384105ce7ee1636d34f2afb1c9

    • SHA1

      3f23d152cc7badf728dfd60f6baa5c861a500630

    • SHA256

      42fbb2437faf68bae5c5877bed4d257e14788ff81f670926e1d4bbe731e7981b

    • SHA512

      d854b736f4f5e21db59b784e18e08e6047c601946b80da26fea019ef3725ee8cf85f99fecfd05dc70dac295e38a55609593ce7ad9a16332713c6d0257f922368

    Score
    10/10
    • Meta Stealer Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks