General

  • Target

    7112dd90bc150b3b5c2dee15db227dfbba9acf4061faf4f09a0ebe38f60c3de1

  • Size

    197KB

  • Sample

    231222-eg774sdgh2

  • MD5

    54f4f323d4819dfa370e0710a5aca332

  • SHA1

    80e30aa6b8fd9c13c4f1dcda254b18a9302c37ae

  • SHA256

    7112dd90bc150b3b5c2dee15db227dfbba9acf4061faf4f09a0ebe38f60c3de1

  • SHA512

    10a861ee0b5127583cb41fef2258c784557814fc1c9d8a2f6ee94bff4e505ef00b581d88ad217f16ce62742a65e3ef9e527cd25bf645fdc0efd5275ee1f9bfc6

  • SSDEEP

    3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

Malware Config

Targets

    • Target

      7112dd90bc150b3b5c2dee15db227dfbba9acf4061faf4f09a0ebe38f60c3de1

    • Size

      197KB

    • MD5

      54f4f323d4819dfa370e0710a5aca332

    • SHA1

      80e30aa6b8fd9c13c4f1dcda254b18a9302c37ae

    • SHA256

      7112dd90bc150b3b5c2dee15db227dfbba9acf4061faf4f09a0ebe38f60c3de1

    • SHA512

      10a861ee0b5127583cb41fef2258c784557814fc1c9d8a2f6ee94bff4e505ef00b581d88ad217f16ce62742a65e3ef9e527cd25bf645fdc0efd5275ee1f9bfc6

    • SSDEEP

      3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks