General

  • Target

    60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c

  • Size

    130KB

  • Sample

    221124-ar8t6sad51

  • MD5

    367d663b41a11fa2a6a33f76db2f3540

  • SHA1

    d3ddf332930fe9ccf664a27b643ba7a87503e7d6

  • SHA256

    60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c

  • SHA512

    23ddc16bd0548b15ff12d8e0be3a6b725942da7329bac793c794332756f7f9efec2c91cc44063601a80782df599895913e3147e9bfaf63e62bb038a40ec464a2

  • SSDEEP

    3072:VTre+ao/3N/YJEgPbtNLHBlQZfIWC6xXMIYga:c+ao1/YDtN7KcIYZ

Score
8/10

Malware Config

Targets

    • Target

      60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c

    • Size

      130KB

    • MD5

      367d663b41a11fa2a6a33f76db2f3540

    • SHA1

      d3ddf332930fe9ccf664a27b643ba7a87503e7d6

    • SHA256

      60eb9df96eea5db1d3d0037b06d7db030028cedf37548fd95cf8607704e8b49c

    • SHA512

      23ddc16bd0548b15ff12d8e0be3a6b725942da7329bac793c794332756f7f9efec2c91cc44063601a80782df599895913e3147e9bfaf63e62bb038a40ec464a2

    • SSDEEP

      3072:VTre+ao/3N/YJEgPbtNLHBlQZfIWC6xXMIYga:c+ao1/YDtN7KcIYZ

    Score
    8/10
    • Executes dropped EXE

    • Deletes itself

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks