General

  • Target

    512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750

  • Size

    183KB

  • Sample

    231014-bzbebabg55

  • MD5

    ad263cb24bd45f358afdae1af924b88a

  • SHA1

    60c7db5c7df0e77a8f38228d6d6c1dd87ffc57ab

  • SHA256

    512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750

  • SHA512

    7e6b06cbe6acfc51451f953fd396d1290c472d78547a1bf61279b50400a55b9ad7812bf3b376ad44fd069662ad2d022d4434ac431615194b3715fd1fc7c1b76d

  • SSDEEP

    3072:qecVOv+Kq7XRdEQ0FJ1ppM48XjyN8PtySC5bsOynXacwoge1i2qZgzoI7h+aS1GI:IKq7hd2b/b2yGPteb5KqcX1+Zgzo0naD

Malware Config

Targets

    • Target

      512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750

    • Size

      183KB

    • MD5

      ad263cb24bd45f358afdae1af924b88a

    • SHA1

      60c7db5c7df0e77a8f38228d6d6c1dd87ffc57ab

    • SHA256

      512e5f13abc1a98f84dd6e9ec4a9b5a85e8ad1136be7b7b048814c22ccce2750

    • SHA512

      7e6b06cbe6acfc51451f953fd396d1290c472d78547a1bf61279b50400a55b9ad7812bf3b376ad44fd069662ad2d022d4434ac431615194b3715fd1fc7c1b76d

    • SSDEEP

      3072:qecVOv+Kq7XRdEQ0FJ1ppM48XjyN8PtySC5bsOynXacwoge1i2qZgzoI7h+aS1GI:IKq7hd2b/b2yGPteb5KqcX1+Zgzo0naD

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Detected potential entity reuse from brand microsoft.

MITRE ATT&CK Enterprise v15

Tasks