General

  • Target

    4fd5bbce5b6bf8c660ae44d88c1b430ad40e0da3a6a656d4f3501ea200ea410e

  • Size

    5.1MB

  • Sample

    231004-p15lfadg24

  • MD5

    8317b4e82510946e1916a38601e41b62

  • SHA1

    018d134e03c0119ffbfaeac19eb6afbd9490f618

  • SHA256

    4fd5bbce5b6bf8c660ae44d88c1b430ad40e0da3a6a656d4f3501ea200ea410e

  • SHA512

    0a5942ba0cf82e65cd4469000149d5e33123cbbdbee6057575f666e5c31d006a2e13afd0c6cbd7f5227c166643724aad0f2908c2c8ca39a61a767c8095024b35

  • SSDEEP

    98304:BqriwhBIJwF42EGaQEnKv0GdTRl8XVtZVnU0:mzBxMxKv0UTRqnJ

Malware Config

Targets

    • Target

      4fd5bbce5b6bf8c660ae44d88c1b430ad40e0da3a6a656d4f3501ea200ea410e

    • Size

      5.1MB

    • MD5

      8317b4e82510946e1916a38601e41b62

    • SHA1

      018d134e03c0119ffbfaeac19eb6afbd9490f618

    • SHA256

      4fd5bbce5b6bf8c660ae44d88c1b430ad40e0da3a6a656d4f3501ea200ea410e

    • SHA512

      0a5942ba0cf82e65cd4469000149d5e33123cbbdbee6057575f666e5c31d006a2e13afd0c6cbd7f5227c166643724aad0f2908c2c8ca39a61a767c8095024b35

    • SSDEEP

      98304:BqriwhBIJwF42EGaQEnKv0GdTRl8XVtZVnU0:mzBxMxKv0UTRqnJ

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks