General

  • Target

    38e08a39ea12fec309d7c8372ced1b72

  • Size

    585KB

  • Sample

    231225-yfenyschdn

  • MD5

    38e08a39ea12fec309d7c8372ced1b72

  • SHA1

    029e4d914c7d9b79cc661435db9dcb63725bde5d

  • SHA256

    40403b9280d7fea0fc96d223d9bf28ccd09740c264ac61d67624d8bb6036dc9a

  • SHA512

    1daeb31c896cad24c2dbfb0c87048b73221801cb92eaf42943d611e7ba364bd801750ed3ccf6ba8430178ea54f9fa8e2290e898cc0f12ce6eea2717c5f789db8

  • SSDEEP

    12288:KCmsgvD4TcUTxBEOBX05vNnyL+VKM+A0nYU+aXyxf:fiDAg805vNboM+FYv4yxf

Score
7/10

Malware Config

Targets

    • Target

      38e08a39ea12fec309d7c8372ced1b72

    • Size

      585KB

    • MD5

      38e08a39ea12fec309d7c8372ced1b72

    • SHA1

      029e4d914c7d9b79cc661435db9dcb63725bde5d

    • SHA256

      40403b9280d7fea0fc96d223d9bf28ccd09740c264ac61d67624d8bb6036dc9a

    • SHA512

      1daeb31c896cad24c2dbfb0c87048b73221801cb92eaf42943d611e7ba364bd801750ed3ccf6ba8430178ea54f9fa8e2290e898cc0f12ce6eea2717c5f789db8

    • SSDEEP

      12288:KCmsgvD4TcUTxBEOBX05vNnyL+VKM+A0nYU+aXyxf:fiDAg805vNboM+FYv4yxf

    Score
    7/10
    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks