General

  • Target

    IMG_20230509_083423.jpg

  • Size

    3.5MB

  • Sample

    230511-pbjbxadb98

  • MD5

    e7362c2fbefdc08ff8041e2183d30b56

  • SHA1

    c7c7d6ef5570a926bc00ec60d40b51f9c5f1d76d

  • SHA256

    61e80dd7d62f2c30a972670fbd2747f744086576ce4e4313408ea3d63f2fc680

  • SHA512

    40e18193c45419bdec5bc80a6181cc74c1f49aeec573721df9d8aeff3406c3dd622b5966a0a39f6c894d4a2d7ed9d53bbdbea5357efcab920f07b402110ae74a

  • SSDEEP

    98304:PFQ7jHtg9U27rGK6kQ3HWpA1KB9ksbZNhOWRhMpt:PFUjHk7bfQXQosksoWRhW

Malware Config

Targets

    • Target

      IMG_20230509_083423.jpg

    • Size

      3.5MB

    • MD5

      e7362c2fbefdc08ff8041e2183d30b56

    • SHA1

      c7c7d6ef5570a926bc00ec60d40b51f9c5f1d76d

    • SHA256

      61e80dd7d62f2c30a972670fbd2747f744086576ce4e4313408ea3d63f2fc680

    • SHA512

      40e18193c45419bdec5bc80a6181cc74c1f49aeec573721df9d8aeff3406c3dd622b5966a0a39f6c894d4a2d7ed9d53bbdbea5357efcab920f07b402110ae74a

    • SSDEEP

      98304:PFQ7jHtg9U27rGK6kQ3HWpA1KB9ksbZNhOWRhMpt:PFUjHk7bfQXQosksoWRhW

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks