General

  • Target

    9026ec6ba4168711286d710db2c45146

  • Size

    53KB

  • Sample

    240204-zxmassaha7

  • MD5

    9026ec6ba4168711286d710db2c45146

  • SHA1

    9b930c0b7585b9d8665370e54dd0f51a67fdd3c2

  • SHA256

    7bf0c7d9d1f2f280bae6aa1a831ab74e5106b3649ca9a9867e4e751cddb5f009

  • SHA512

    603e2d2f31022703e7a344761fca8fc60f48040f35019ecce5452772bced17c73e55e40071f9629fe518d9c1aa4192729ddfa9dd61b442afc778e309b47562bd

  • SSDEEP

    1536:SEbBPkeCBrZHVX5mXgwp3tEuitdLKrzTHi:SImFPigwVtHitdLKe

Malware Config

Targets

    • Target

      9026ec6ba4168711286d710db2c45146

    • Size

      53KB

    • MD5

      9026ec6ba4168711286d710db2c45146

    • SHA1

      9b930c0b7585b9d8665370e54dd0f51a67fdd3c2

    • SHA256

      7bf0c7d9d1f2f280bae6aa1a831ab74e5106b3649ca9a9867e4e751cddb5f009

    • SHA512

      603e2d2f31022703e7a344761fca8fc60f48040f35019ecce5452772bced17c73e55e40071f9629fe518d9c1aa4192729ddfa9dd61b442afc778e309b47562bd

    • SSDEEP

      1536:SEbBPkeCBrZHVX5mXgwp3tEuitdLKrzTHi:SImFPigwVtHitdLKe

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops desktop.ini file(s)

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks