General

  • Target

    bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35

  • Size

    147KB

  • Sample

    231031-2p3c6aha83

  • MD5

    3b3c01a9c6caf4ff6e924aa6ad719414

  • SHA1

    0345490e5a5559af8ebef29a11bd993f17f829d5

  • SHA256

    bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35

  • SHA512

    aca357df482db81998c9250bc149bca23cf7c6bce1f58b41b8f7505e4e4ea7caf2d878d36ac0eea09970942206cc44040748f54b1791ba4916d895a8fa51b37d

  • SSDEEP

    3072:2AaY46tGNttyeQLYm13rFob8LjUbb5d6u6:346tGdye413Cb8vU76r

Score
8/10

Malware Config

Targets

    • Target

      bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35

    • Size

      147KB

    • MD5

      3b3c01a9c6caf4ff6e924aa6ad719414

    • SHA1

      0345490e5a5559af8ebef29a11bd993f17f829d5

    • SHA256

      bd53e524c15b5a5b8bbbf9b230e83c69ca48c9442ba8eba2aacc875e5e6f6e35

    • SHA512

      aca357df482db81998c9250bc149bca23cf7c6bce1f58b41b8f7505e4e4ea7caf2d878d36ac0eea09970942206cc44040748f54b1791ba4916d895a8fa51b37d

    • SSDEEP

      3072:2AaY46tGNttyeQLYm13rFob8LjUbb5d6u6:346tGdye413Cb8vU76r

    Score
    8/10
    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks