General

  • Target

    60d18cc6c25202b4f01c998a151ab464

  • Size

    56KB

  • Sample

    231226-knnpyacde4

  • MD5

    60d18cc6c25202b4f01c998a151ab464

  • SHA1

    c44815b5cc21bf302b51a239bf9e7bef854cf0c5

  • SHA256

    45a5ac08a3900c874c63cbf01322c6f6fd9db483b7df8cc8e9b136dd415087b8

  • SHA512

    e5611a2dd0d43d4711ddbd128bdeac5f6e337b3b4c87c7a0f232f107b8d162937a43cc5240a611ee9f113f42abda313be09f0a180f25c4cbfbdc675bde3fe151

  • SSDEEP

    768:Xbirg9LnoH2JWj1IypkMfOUhpaxSihYwG4O47ixSEPkJJaPHnsW/8imLkr:XbQL2S1gMnaxSumBUi1r

Malware Config

Targets

    • Target

      60d18cc6c25202b4f01c998a151ab464

    • Size

      56KB

    • MD5

      60d18cc6c25202b4f01c998a151ab464

    • SHA1

      c44815b5cc21bf302b51a239bf9e7bef854cf0c5

    • SHA256

      45a5ac08a3900c874c63cbf01322c6f6fd9db483b7df8cc8e9b136dd415087b8

    • SHA512

      e5611a2dd0d43d4711ddbd128bdeac5f6e337b3b4c87c7a0f232f107b8d162937a43cc5240a611ee9f113f42abda313be09f0a180f25c4cbfbdc675bde3fe151

    • SSDEEP

      768:Xbirg9LnoH2JWj1IypkMfOUhpaxSihYwG4O47ixSEPkJJaPHnsW/8imLkr:XbQL2S1gMnaxSumBUi1r

    • Grants admin privileges

      Uses net.exe to modify the user's privileges.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks