General

  • Target

    1be1fdcc52d184f59f0f0365baf0cc92

  • Size

    48KB

  • Sample

    231230-za55dsgbf9

  • MD5

    1be1fdcc52d184f59f0f0365baf0cc92

  • SHA1

    1211d5dc5a7f7d76a82d29301e7f6f7bf55eea12

  • SHA256

    cf8db1350dafacec44eb35523b72db0fe4310618052df36d6816143044db2e9d

  • SHA512

    7c7f66912e3e9aded8bbd43957dc78d671238dc1f3189b462a741797d1fc36ab12756c467793253d19b19f82cbc5b38ab132a3d5359f478a78114442a821c619

  • SSDEEP

    768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEF8M60rWGI3Ze/RK9zMbW:SKcR4mjD9r823F8yCGIpgk9QbuNo2

Malware Config

Targets

    • Target

      1be1fdcc52d184f59f0f0365baf0cc92

    • Size

      48KB

    • MD5

      1be1fdcc52d184f59f0f0365baf0cc92

    • SHA1

      1211d5dc5a7f7d76a82d29301e7f6f7bf55eea12

    • SHA256

      cf8db1350dafacec44eb35523b72db0fe4310618052df36d6816143044db2e9d

    • SHA512

      7c7f66912e3e9aded8bbd43957dc78d671238dc1f3189b462a741797d1fc36ab12756c467793253d19b19f82cbc5b38ab132a3d5359f478a78114442a821c619

    • SSDEEP

      768:XocAX3LKew369lp2z3Sd4baFXLjwP/Tgj93b8NIocVSEF8M60rWGI3Ze/RK9zMbW:SKcR4mjD9r823F8yCGIpgk9QbuNo2

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks