General

  • Target

    400acaacfe51458118a9e147189d3078

  • Size

    123KB

  • Sample

    240104-gegcqahgcl

  • MD5

    400acaacfe51458118a9e147189d3078

  • SHA1

    e821c0659887ee001130e37b1fb8c1a1b3c3bf70

  • SHA256

    6f8414d94f2da17d4ca602f2af65b8634169e2edc3afbb5849bf395f715af00f

  • SHA512

    3fba10a82b95c95b81e2e5cae57677a31a238b228bdb0cbb7e0c2b3dcdbac430671b3797e079d52d5ea0beef7bde702fc93240569a1340417f3ef97920fe996c

  • SSDEEP

    3072:SKcWmjRrz3ZKcWmjRrz3PNAKIOXtGQqiIzWNsHkAyxY9u:hGyGlAKR9GhimByN

Malware Config

Targets

    • Target

      400acaacfe51458118a9e147189d3078

    • Size

      123KB

    • MD5

      400acaacfe51458118a9e147189d3078

    • SHA1

      e821c0659887ee001130e37b1fb8c1a1b3c3bf70

    • SHA256

      6f8414d94f2da17d4ca602f2af65b8634169e2edc3afbb5849bf395f715af00f

    • SHA512

      3fba10a82b95c95b81e2e5cae57677a31a238b228bdb0cbb7e0c2b3dcdbac430671b3797e079d52d5ea0beef7bde702fc93240569a1340417f3ef97920fe996c

    • SSDEEP

      3072:SKcWmjRrz3ZKcWmjRrz3PNAKIOXtGQqiIzWNsHkAyxY9u:hGyGlAKR9GhimByN

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks