General

  • Target

    4662ff77d939ddd53c5dbc5577a50c4cfcb83d0a7ca331a65b2fdfb18437eb7a

  • Size

    2.8MB

  • Sample

    231005-q6ms9abe4w

  • MD5

    4a5cf5248d089be22f0b439812fb7bd0

  • SHA1

    50a755514c05978d6d57bc49bf74efb13c17e975

  • SHA256

    4662ff77d939ddd53c5dbc5577a50c4cfcb83d0a7ca331a65b2fdfb18437eb7a

  • SHA512

    486439b16bd0eeb528181743a7783f2758d0ada880c4f812239bbbc0487bf93dedc4084e8116c984e57fe7013f01fca16e4d3ed1f0c99f9870259289ed1b6580

  • SSDEEP

    49152:yB8rNIqVaKn1s6A3lX+Yzh9bOKZD/FJjmFbZMpmjRd9fqisdwIYdEBu+opkSQk:GER91WdzzjaUzANOIX9fqCEBujkSQk

Score
8/10

Malware Config

Targets

    • Target

      4662ff77d939ddd53c5dbc5577a50c4cfcb83d0a7ca331a65b2fdfb18437eb7a

    • Size

      2.8MB

    • MD5

      4a5cf5248d089be22f0b439812fb7bd0

    • SHA1

      50a755514c05978d6d57bc49bf74efb13c17e975

    • SHA256

      4662ff77d939ddd53c5dbc5577a50c4cfcb83d0a7ca331a65b2fdfb18437eb7a

    • SHA512

      486439b16bd0eeb528181743a7783f2758d0ada880c4f812239bbbc0487bf93dedc4084e8116c984e57fe7013f01fca16e4d3ed1f0c99f9870259289ed1b6580

    • SSDEEP

      49152:yB8rNIqVaKn1s6A3lX+Yzh9bOKZD/FJjmFbZMpmjRd9fqisdwIYdEBu+opkSQk:GER91WdzzjaUzANOIX9fqCEBujkSQk

    Score
    8/10
    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks