General

  • Target

    5319c07b288a5ee9617a026be5bd89ae

  • Size

    124KB

  • Sample

    240111-k27pzadge4

  • MD5

    5319c07b288a5ee9617a026be5bd89ae

  • SHA1

    40e97c9f2797f4b2ce12ec4073ae8bc387ad0e1d

  • SHA256

    928c00726075279e52bdb3d3ddb3faff558560df0bd9e69bf3f7da922eec2a17

  • SHA512

    c49768e6fff3204cc73f8730af3cfedceac647203977295e43d7bcf83839ae450442ab36627e0eb794cc12190a84502fa3e6370ee94a10684ec865ea06754c34

  • SSDEEP

    3072:SKcWmjRrz3cNMmzS1ec4UI8C6EmsBxcQbBOI24N4+VPKJukmOrO+cnQQ4:hGcNMQNUl/EN3KJurOq+8J4

Malware Config

Targets

    • Target

      5319c07b288a5ee9617a026be5bd89ae

    • Size

      124KB

    • MD5

      5319c07b288a5ee9617a026be5bd89ae

    • SHA1

      40e97c9f2797f4b2ce12ec4073ae8bc387ad0e1d

    • SHA256

      928c00726075279e52bdb3d3ddb3faff558560df0bd9e69bf3f7da922eec2a17

    • SHA512

      c49768e6fff3204cc73f8730af3cfedceac647203977295e43d7bcf83839ae450442ab36627e0eb794cc12190a84502fa3e6370ee94a10684ec865ea06754c34

    • SSDEEP

      3072:SKcWmjRrz3cNMmzS1ec4UI8C6EmsBxcQbBOI24N4+VPKJukmOrO+cnQQ4:hGcNMQNUl/EN3KJurOq+8J4

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks