General

  • Target

    cd48b6f8f7ef5272d552a73021dd43f45dab66fe17a946a67abd639a1e782b5c

  • Size

    478KB

  • Sample

    230904-ljrrgaff26

  • MD5

    ebd7225ca6d2671c11276e57b4b98968

  • SHA1

    f15a6567337e16fa539e483bec4f422c1931614b

  • SHA256

    cd48b6f8f7ef5272d552a73021dd43f45dab66fe17a946a67abd639a1e782b5c

  • SHA512

    1a4334c7779ac3f7765ebd38bde9c80203e4b63a2f9fbb53aace6fbc8904f92eed38592ec8fc8cfd1eb9d51dfa1b2d74f23efe2a58a75d8d64f418f3a695bce0

  • SSDEEP

    12288:oUMHdZc0IursYCYQeSnyZJiqlEbXSb9NtCGOF2O27MVzy:JMHxMYenGJiKEbXWtfOkUy

Malware Config

Targets

    • Target

      cd48b6f8f7ef5272d552a73021dd43f45dab66fe17a946a67abd639a1e782b5c

    • Size

      478KB

    • MD5

      ebd7225ca6d2671c11276e57b4b98968

    • SHA1

      f15a6567337e16fa539e483bec4f422c1931614b

    • SHA256

      cd48b6f8f7ef5272d552a73021dd43f45dab66fe17a946a67abd639a1e782b5c

    • SHA512

      1a4334c7779ac3f7765ebd38bde9c80203e4b63a2f9fbb53aace6fbc8904f92eed38592ec8fc8cfd1eb9d51dfa1b2d74f23efe2a58a75d8d64f418f3a695bce0

    • SSDEEP

      12288:oUMHdZc0IursYCYQeSnyZJiqlEbXSb9NtCGOF2O27MVzy:JMHxMYenGJiKEbXWtfOkUy

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks