General

  • Target

    2d978f0263893ec8fe46bbc1d336ea6c31fb5c75d71db654f8a60fe7f752727b

  • Size

    4.2MB

  • Sample

    231116-vafsaadb68

  • MD5

    76d95a0301379a2a5b87d4c403d210bd

  • SHA1

    e3bdbcaf4bc198b751374735b78885d210d77faf

  • SHA256

    2d978f0263893ec8fe46bbc1d336ea6c31fb5c75d71db654f8a60fe7f752727b

  • SHA512

    2aaf480a3571b7fe0ec630768099a913a46df28137222994857252a254d2081cccb8f448a34b90a7aaf2f4f5b8fa9240e59f8a220024b58e642f01ccef4a0fbb

  • SSDEEP

    49152:l08OhxtUg9OUi82w6aQp9dgS1GUL38XhCOYc3iJXv9emEPGKOPkQThMYRMnm7LBl:l08vdsGaQNgS1r6e6ngKpq6D527BWG

Malware Config

Targets

    • Target

      2d978f0263893ec8fe46bbc1d336ea6c31fb5c75d71db654f8a60fe7f752727b

    • Size

      4.2MB

    • MD5

      76d95a0301379a2a5b87d4c403d210bd

    • SHA1

      e3bdbcaf4bc198b751374735b78885d210d77faf

    • SHA256

      2d978f0263893ec8fe46bbc1d336ea6c31fb5c75d71db654f8a60fe7f752727b

    • SHA512

      2aaf480a3571b7fe0ec630768099a913a46df28137222994857252a254d2081cccb8f448a34b90a7aaf2f4f5b8fa9240e59f8a220024b58e642f01ccef4a0fbb

    • SSDEEP

      49152:l08OhxtUg9OUi82w6aQp9dgS1GUL38XhCOYc3iJXv9emEPGKOPkQThMYRMnm7LBl:l08vdsGaQNgS1r6e6ngKpq6D527BWG

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks