General

  • Target

    50efdcf6fb74b0373b8d1329a84f6f75.exe

  • Size

    33KB

  • Sample

    240110-yb1qmafbaq

  • MD5

    50efdcf6fb74b0373b8d1329a84f6f75

  • SHA1

    b57e6d625b3f487bb887c28f8696775a62bfb839

  • SHA256

    bd2b43700e0d6a38a02f49990ce8314f100b894b30e1dfaf643e4b1f5ac1ac53

  • SHA512

    c36c3b48aabb977bef6aa77693c472df4e4fbf06b4e7f69b3802b15425678871153bb7dd75811a87eeebdf45aff673b04c07bc27478a4f88340a76491650e7e2

  • SSDEEP

    384:I87wpX3qM031cmXosHg15JpQWX+f2o0ajzLfWcIuvWoaWvNL048FKAGlcODkoGRI:I/MXosA15n/Xe0Sn+KYfokGjJmxOY

Malware Config

Targets

    • Target

      50efdcf6fb74b0373b8d1329a84f6f75.exe

    • Size

      33KB

    • MD5

      50efdcf6fb74b0373b8d1329a84f6f75

    • SHA1

      b57e6d625b3f487bb887c28f8696775a62bfb839

    • SHA256

      bd2b43700e0d6a38a02f49990ce8314f100b894b30e1dfaf643e4b1f5ac1ac53

    • SHA512

      c36c3b48aabb977bef6aa77693c472df4e4fbf06b4e7f69b3802b15425678871153bb7dd75811a87eeebdf45aff673b04c07bc27478a4f88340a76491650e7e2

    • SSDEEP

      384:I87wpX3qM031cmXosHg15JpQWX+f2o0ajzLfWcIuvWoaWvNL048FKAGlcODkoGRI:I/MXosA15n/Xe0Sn+KYfokGjJmxOY

    • Modifies WinLogon for persistence

    • Drops startup file

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks