General

  • Target

    c30cba14baed76ef15b882815ba6fe40_JC.exe

  • Size

    422KB

  • Sample

    231013-cbr8laab3x

  • MD5

    c30cba14baed76ef15b882815ba6fe40

  • SHA1

    11bb4256249ebf8411853a0516b8689901315f71

  • SHA256

    6eb33aba0547d9b4fbfd68beb0f77b17f2cff22fd86ef67cf88a470a2f046b28

  • SHA512

    80f720b5a135cacd24be5c776d2140f17b91731034ce1b76470d1c9d2bc6b7bcbbec913462f7b55dfcbbfdad0ccd786a664ca78571f0a3de2613997bef865213

  • SSDEEP

    6144:eGxmsc1URAP63JeJMpqojYraTWomVjJO0DDDjC/tPhpTkPpMPM7Atvt44No/WxM0:e9scszZFseWomPrHD2FPbkPV7exjJmQ

Malware Config

Targets

    • Target

      c30cba14baed76ef15b882815ba6fe40_JC.exe

    • Size

      422KB

    • MD5

      c30cba14baed76ef15b882815ba6fe40

    • SHA1

      11bb4256249ebf8411853a0516b8689901315f71

    • SHA256

      6eb33aba0547d9b4fbfd68beb0f77b17f2cff22fd86ef67cf88a470a2f046b28

    • SHA512

      80f720b5a135cacd24be5c776d2140f17b91731034ce1b76470d1c9d2bc6b7bcbbec913462f7b55dfcbbfdad0ccd786a664ca78571f0a3de2613997bef865213

    • SSDEEP

      6144:eGxmsc1URAP63JeJMpqojYraTWomVjJO0DDDjC/tPhpTkPpMPM7Atvt44No/WxM0:e9scszZFseWomPrHD2FPbkPV7exjJmQ

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks