General

  • Target

    9be83aa0c8e94797e7a06222d25492d8

  • Size

    1.9MB

  • Sample

    240214-rpzxxsda3v

  • MD5

    9be83aa0c8e94797e7a06222d25492d8

  • SHA1

    d05046e70d7c60e065624e6a8a58e50c699ae8ec

  • SHA256

    0f442db73c90b0266e299ccd58533175b87226f893e240a428249b2ae846e97e

  • SHA512

    1461bac02db174adc176f32996a83942fccd8a8480c33881c6ef57569eff32701190c73333732db5c50e21ce2790b78c35c3c388b7b539ede88360e12f4cfc49

  • SSDEEP

    49152:h31pue12uoDT0wWCInG74ozlcOhvmYowf0YD8LgEbpCp:zd12xQ3zezmXYo0gQ

Malware Config

Targets

    • Target

      9be83aa0c8e94797e7a06222d25492d8

    • Size

      1.9MB

    • MD5

      9be83aa0c8e94797e7a06222d25492d8

    • SHA1

      d05046e70d7c60e065624e6a8a58e50c699ae8ec

    • SHA256

      0f442db73c90b0266e299ccd58533175b87226f893e240a428249b2ae846e97e

    • SHA512

      1461bac02db174adc176f32996a83942fccd8a8480c33881c6ef57569eff32701190c73333732db5c50e21ce2790b78c35c3c388b7b539ede88360e12f4cfc49

    • SSDEEP

      49152:h31pue12uoDT0wWCInG74ozlcOhvmYowf0YD8LgEbpCp:zd12xQ3zezmXYo0gQ

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks