General

  • Target

    7872ccdb98a1f1ff5af88dedb866abc1e589f33d637db87ac9fd8c915119ea84

  • Size

    199KB

  • Sample

    240101-jw9rpshcb3

  • MD5

    48ad5b7c0c14fa6052b0660a9e9c042b

  • SHA1

    4e8598861c51edebbbfe4af5b87ba48cb6e873b4

  • SHA256

    7872ccdb98a1f1ff5af88dedb866abc1e589f33d637db87ac9fd8c915119ea84

  • SHA512

    080bbd8d4f038e91fd1bcecf06c5e5e8c368da3651d3ec4fdaebffea32d2de423d6f72c90a1b47e197676b1c6d1e1e77cef0a841c93ac2008750811d5eb536c1

  • SSDEEP

    3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

Malware Config

Targets

    • Target

      7872ccdb98a1f1ff5af88dedb866abc1e589f33d637db87ac9fd8c915119ea84

    • Size

      199KB

    • MD5

      48ad5b7c0c14fa6052b0660a9e9c042b

    • SHA1

      4e8598861c51edebbbfe4af5b87ba48cb6e873b4

    • SHA256

      7872ccdb98a1f1ff5af88dedb866abc1e589f33d637db87ac9fd8c915119ea84

    • SHA512

      080bbd8d4f038e91fd1bcecf06c5e5e8c368da3651d3ec4fdaebffea32d2de423d6f72c90a1b47e197676b1c6d1e1e77cef0a841c93ac2008750811d5eb536c1

    • SSDEEP

      3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks