General

  • Target

    5d1fd1d1ae437e99d9fa28b3d3fb6507

  • Size

    684KB

  • Sample

    231226-jhk67aeca9

  • MD5

    5d1fd1d1ae437e99d9fa28b3d3fb6507

  • SHA1

    e5625453783e8aa8d7e6dce5d55ed468be011675

  • SHA256

    ed4f6d7131f1fbc7f2e19ec00dc0ab041290141c5c3db42770a1d17118ddae9c

  • SHA512

    eb19178bb31cfb9b576af66b36c98378cbfeaa59d872668f46f7e094169dff8c701d9ed5138ab813de2257a84698910b930a3dd0dbe86745288aca00a834d195

  • SSDEEP

    12288:5xpRWJLxzaqPcTGMqyv1d8KWDG6ofpoboIjDK2YG3qcPh8+k9is1V:PpwPCGuP+HeekDmW51V

Malware Config

Targets

    • Target

      5d1fd1d1ae437e99d9fa28b3d3fb6507

    • Size

      684KB

    • MD5

      5d1fd1d1ae437e99d9fa28b3d3fb6507

    • SHA1

      e5625453783e8aa8d7e6dce5d55ed468be011675

    • SHA256

      ed4f6d7131f1fbc7f2e19ec00dc0ab041290141c5c3db42770a1d17118ddae9c

    • SHA512

      eb19178bb31cfb9b576af66b36c98378cbfeaa59d872668f46f7e094169dff8c701d9ed5138ab813de2257a84698910b930a3dd0dbe86745288aca00a834d195

    • SSDEEP

      12288:5xpRWJLxzaqPcTGMqyv1d8KWDG6ofpoboIjDK2YG3qcPh8+k9is1V:PpwPCGuP+HeekDmW51V

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks