General

  • Target

    02111a64fa9e214967e4d9a5c239779c

  • Size

    116KB

  • Sample

    231229-yefvmaddfn

  • MD5

    02111a64fa9e214967e4d9a5c239779c

  • SHA1

    900b2f3f23ee47f789302afde1b0806658035a2d

  • SHA256

    fd53b6ea761e55a4559804716741d58da141f9a009efd1a4b64b551a8fd43816

  • SHA512

    e4219220eccd66f33af084c964eac357c884b4ddf4caaf8b26050b2d3f3a582bd163bccc473f75e7e8db1e9252c53bd3e52d7082bf454685820edf9384e2b983

  • SSDEEP

    3072:SKcWmjRrz3qrCILVhucelHlTKemmq+by8:hGqm4hucCvq+L

Malware Config

Targets

    • Target

      02111a64fa9e214967e4d9a5c239779c

    • Size

      116KB

    • MD5

      02111a64fa9e214967e4d9a5c239779c

    • SHA1

      900b2f3f23ee47f789302afde1b0806658035a2d

    • SHA256

      fd53b6ea761e55a4559804716741d58da141f9a009efd1a4b64b551a8fd43816

    • SHA512

      e4219220eccd66f33af084c964eac357c884b4ddf4caaf8b26050b2d3f3a582bd163bccc473f75e7e8db1e9252c53bd3e52d7082bf454685820edf9384e2b983

    • SSDEEP

      3072:SKcWmjRrz3qrCILVhucelHlTKemmq+by8:hGqm4hucCvq+L

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks