General

  • Target

    9aadac44f06b25349047a1f41aa8a8b3

  • Size

    809KB

  • Sample

    240214-ecwnhsgb5x

  • MD5

    9aadac44f06b25349047a1f41aa8a8b3

  • SHA1

    3738caf6732f44ed55dcbaec01abdb6553f2ecbb

  • SHA256

    8549a35a396a224d676977d392eb197b860acd3390cb1b258c609d47e4cffc7f

  • SHA512

    1096d04b36118a0c9134aabaad87d49663646154a5c8cfa5e5d34b4c3b6b3cdb55c6c6f1582141cf12a172674bd7d6dd02c7d1af71c1e21d8a203607d3089528

  • SSDEEP

    24576:vFeAmTo3hFR6MQSTNF0k4e9t1Lk6atocGBpGP2:vJH3nYlSxF0MxatjGBM2

Malware Config

Targets

    • Target

      9aadac44f06b25349047a1f41aa8a8b3

    • Size

      809KB

    • MD5

      9aadac44f06b25349047a1f41aa8a8b3

    • SHA1

      3738caf6732f44ed55dcbaec01abdb6553f2ecbb

    • SHA256

      8549a35a396a224d676977d392eb197b860acd3390cb1b258c609d47e4cffc7f

    • SHA512

      1096d04b36118a0c9134aabaad87d49663646154a5c8cfa5e5d34b4c3b6b3cdb55c6c6f1582141cf12a172674bd7d6dd02c7d1af71c1e21d8a203607d3089528

    • SSDEEP

      24576:vFeAmTo3hFR6MQSTNF0k4e9t1Lk6atocGBpGP2:vJH3nYlSxF0MxatjGBM2

    • Modifies Installed Components in the registry

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks