General

  • Target

    Black.exe

  • Size

    341KB

  • Sample

    230923-gf1gzsda8x

  • MD5

    55e9b1518973a808c7b567fe3ad52153

  • SHA1

    71466e12ae1ebac959d9f7e25a29b227aed3d444

  • SHA256

    0320a774ff045d356ee357b719e29ff6d1b55fca6f0c1084250f696f7190fb7b

  • SHA512

    463b1566ec732afdfd50b1a226f0b879c5673a5a4e2452631fa838980b0a7fd74a82681982c937495499bac6cfc55baca57b27c2542760e4a27ce6a636321713

  • SSDEEP

    6144:BqJ6/qj72fHP4hox9uWwLYcwbavN1auTi:BqUq+X4wcwbaE

Malware Config

Targets

    • Target

      Black.exe

    • Size

      341KB

    • MD5

      55e9b1518973a808c7b567fe3ad52153

    • SHA1

      71466e12ae1ebac959d9f7e25a29b227aed3d444

    • SHA256

      0320a774ff045d356ee357b719e29ff6d1b55fca6f0c1084250f696f7190fb7b

    • SHA512

      463b1566ec732afdfd50b1a226f0b879c5673a5a4e2452631fa838980b0a7fd74a82681982c937495499bac6cfc55baca57b27c2542760e4a27ce6a636321713

    • SSDEEP

      6144:BqJ6/qj72fHP4hox9uWwLYcwbavN1auTi:BqUq+X4wcwbaE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v15

Tasks