General

  • Target

    0c537a43f020d1ba36e2b5a05d5a181d

  • Size

    268KB

  • Sample

    231225-hfv3yagfh2

  • MD5

    0c537a43f020d1ba36e2b5a05d5a181d

  • SHA1

    9a745071bb4244819806000253bb5e2bd9eacf3f

  • SHA256

    8bfe749e5e0a9985833b5f6064af69476c7d165ec1ffae8479adf773f56ef71c

  • SHA512

    8bf5298c449b8e43dc8e30e87ba31a5453d789c970ef02cc5307e632c139fcd31175afa4f02deba6bfb831be2cd97aaa3bfb520b4a3f0126f82db0ec2228f272

  • SSDEEP

    6144:UJJglU4Q68qSiuDEiVy+TEa5fdmyKyjsylTopys8bG:41fuiVfPr7jsylTopbF

Malware Config

Targets

    • Target

      0c537a43f020d1ba36e2b5a05d5a181d

    • Size

      268KB

    • MD5

      0c537a43f020d1ba36e2b5a05d5a181d

    • SHA1

      9a745071bb4244819806000253bb5e2bd9eacf3f

    • SHA256

      8bfe749e5e0a9985833b5f6064af69476c7d165ec1ffae8479adf773f56ef71c

    • SHA512

      8bf5298c449b8e43dc8e30e87ba31a5453d789c970ef02cc5307e632c139fcd31175afa4f02deba6bfb831be2cd97aaa3bfb520b4a3f0126f82db0ec2228f272

    • SSDEEP

      6144:UJJglU4Q68qSiuDEiVy+TEa5fdmyKyjsylTopys8bG:41fuiVfPr7jsylTopbF

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks