General

  • Target

    36b43d0696fee79424293d8e0214de4e

  • Size

    768KB

  • Sample

    231231-p19v6abfhj

  • MD5

    36b43d0696fee79424293d8e0214de4e

  • SHA1

    5a89fcfa4e8902f4b6229cd4e491f84123457c81

  • SHA256

    81be35f3d1479c354bc0e24c2a07c69e4c206474b7ec7c596a34d1d4fde33fd1

  • SHA512

    d94857377a1076fd18aa4668e78b0956d1a73d6f6ede04875249326d065b0a6bfae9b729a9dcc66eb3af884d3407c2355a0966f21a51280fc4fdd299a6e03029

  • SSDEEP

    3072:dcTUaEMK5C/mkIl2EvDRf5qN3xjmcTUaEMK5:++M5mkg7RfMDjR+M

Malware Config

Targets

    • Target

      36b43d0696fee79424293d8e0214de4e

    • Size

      768KB

    • MD5

      36b43d0696fee79424293d8e0214de4e

    • SHA1

      5a89fcfa4e8902f4b6229cd4e491f84123457c81

    • SHA256

      81be35f3d1479c354bc0e24c2a07c69e4c206474b7ec7c596a34d1d4fde33fd1

    • SHA512

      d94857377a1076fd18aa4668e78b0956d1a73d6f6ede04875249326d065b0a6bfae9b729a9dcc66eb3af884d3407c2355a0966f21a51280fc4fdd299a6e03029

    • SSDEEP

      3072:dcTUaEMK5C/mkIl2EvDRf5qN3xjmcTUaEMK5:++M5mkg7RfMDjR+M

    • UAC bypass

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops desktop.ini file(s)

    • Drops autorun.inf file

      Malware can abuse Windows Autorun to spread further via attached volumes.

MITRE ATT&CK Enterprise v15

Tasks