General

  • Target

    44b86bf0423e84aaa3930b25bf01a2a9

  • Size

    124KB

  • Sample

    240105-3m2vaacfem

  • MD5

    44b86bf0423e84aaa3930b25bf01a2a9

  • SHA1

    2bdf37db2e02f09061334c9081cc2ee92ff809c7

  • SHA256

    ec7e2d1b4f44c8609f7d3f1739147a2f4a332538357bdaeb782828abf18dc88f

  • SHA512

    082d798ea4310ff355a0611e3d0611e59bcfc4fda0b9139456dcf75b3e423260d03c3062c1fb911696899cccda4b21e32d4978dbd962b2706ca608ec1384f3a7

  • SSDEEP

    3072:v9hYL2lNz9Msq5IyGQJjWw7eKDR6CfzY0Vk9:lKL2Fq5IQdCKDR60k0Vk

Malware Config

Targets

    • Target

      44b86bf0423e84aaa3930b25bf01a2a9

    • Size

      124KB

    • MD5

      44b86bf0423e84aaa3930b25bf01a2a9

    • SHA1

      2bdf37db2e02f09061334c9081cc2ee92ff809c7

    • SHA256

      ec7e2d1b4f44c8609f7d3f1739147a2f4a332538357bdaeb782828abf18dc88f

    • SHA512

      082d798ea4310ff355a0611e3d0611e59bcfc4fda0b9139456dcf75b3e423260d03c3062c1fb911696899cccda4b21e32d4978dbd962b2706ca608ec1384f3a7

    • SSDEEP

      3072:v9hYL2lNz9Msq5IyGQJjWw7eKDR6CfzY0Vk9:lKL2Fq5IQdCKDR60k0Vk

    • Modifies firewall policy service

    • Adds policy Run key to start application

    • Sets service image path in registry

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks