General

  • Target

    7df452d13909ed6a2297c647ced2814f

  • Size

    475KB

  • Sample

    231222-kjv88adfbp

  • MD5

    7df452d13909ed6a2297c647ced2814f

  • SHA1

    d171702b6c0ce012680da7ffca42a72d72fc5bab

  • SHA256

    e671fdffe222a4fff7f8a40be35e9900ebe0bb673a4adc6cd7af39f4f436c370

  • SHA512

    2041a2c3c5c697c4e3b767bf671db8f11c33ce04f2a44d87458572f04e3f72d41fa665bc2142552364d914173bf0400fc929694c4ecbe4895cf50ca7fd3c67c2

  • SSDEEP

    12288:/Rl3uFajPgiIA0NSyl7K/uNy2JPyqYuC38Sz9b91jRbM7pI:/RYFoIrSyE/uNy2d8uCMSF9BRbM7+

Malware Config

Targets

    • Target

      7df452d13909ed6a2297c647ced2814f

    • Size

      475KB

    • MD5

      7df452d13909ed6a2297c647ced2814f

    • SHA1

      d171702b6c0ce012680da7ffca42a72d72fc5bab

    • SHA256

      e671fdffe222a4fff7f8a40be35e9900ebe0bb673a4adc6cd7af39f4f436c370

    • SHA512

      2041a2c3c5c697c4e3b767bf671db8f11c33ce04f2a44d87458572f04e3f72d41fa665bc2142552364d914173bf0400fc929694c4ecbe4895cf50ca7fd3c67c2

    • SSDEEP

      12288:/Rl3uFajPgiIA0NSyl7K/uNy2JPyqYuC38Sz9b91jRbM7pI:/RYFoIrSyE/uNy2d8uCMSF9BRbM7+

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks