General

  • Target

    13b10f99b52a6d4e0fa12a151a4e11d9f0aaa5cad4702f6ff808a4fdd415e5e9

  • Size

    240KB

  • Sample

    240128-s1ydxaedfr

  • MD5

    e8ceff1480bef3080dcabf49aaa3b09e

  • SHA1

    86220e88e925d62184a7c9e4457b2480cbafb4d6

  • SHA256

    13b10f99b52a6d4e0fa12a151a4e11d9f0aaa5cad4702f6ff808a4fdd415e5e9

  • SHA512

    b0e5a341b0d3d76488b174e13719027010ff9e48bc8200f28f636581eae00519a375e5f63d660a5220e02aae14e4c1fc824471d40e8b3bd0418c30c9ab72b188

  • SSDEEP

    6144:65r3lV6n42+3WSKhxD8RVo2rcaGKNqAwyotp2z:6C+3xWDY9IpKNTwyou

Malware Config

Targets

    • Target

      13b10f99b52a6d4e0fa12a151a4e11d9f0aaa5cad4702f6ff808a4fdd415e5e9

    • Size

      240KB

    • MD5

      e8ceff1480bef3080dcabf49aaa3b09e

    • SHA1

      86220e88e925d62184a7c9e4457b2480cbafb4d6

    • SHA256

      13b10f99b52a6d4e0fa12a151a4e11d9f0aaa5cad4702f6ff808a4fdd415e5e9

    • SHA512

      b0e5a341b0d3d76488b174e13719027010ff9e48bc8200f28f636581eae00519a375e5f63d660a5220e02aae14e4c1fc824471d40e8b3bd0418c30c9ab72b188

    • SSDEEP

      6144:65r3lV6n42+3WSKhxD8RVo2rcaGKNqAwyotp2z:6C+3xWDY9IpKNTwyou

    • Blocklisted process makes network request

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks