General

  • Target

    914dbe02a164aa04441bc3b32daaa1bc4beb65384f236f3e1c0faa695d9525ab

  • Size

    203KB

  • Sample

    240225-ha4g5aef2v

  • MD5

    a435eec6c5ca089680ac2cf8f3e46558

  • SHA1

    2bd0c7bb4b8e734a0f445b381cd18b65509e1254

  • SHA256

    914dbe02a164aa04441bc3b32daaa1bc4beb65384f236f3e1c0faa695d9525ab

  • SHA512

    7cd4b592858545782c971c0af18958582e58c88ae48f70fd5c4f3ec582b3f73e23956b495291c2651539d415e3a3704d1ade9df7fe18914575af0c942aed9096

  • SSDEEP

    3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

Malware Config

Targets

    • Target

      914dbe02a164aa04441bc3b32daaa1bc4beb65384f236f3e1c0faa695d9525ab

    • Size

      203KB

    • MD5

      a435eec6c5ca089680ac2cf8f3e46558

    • SHA1

      2bd0c7bb4b8e734a0f445b381cd18b65509e1254

    • SHA256

      914dbe02a164aa04441bc3b32daaa1bc4beb65384f236f3e1c0faa695d9525ab

    • SHA512

      7cd4b592858545782c971c0af18958582e58c88ae48f70fd5c4f3ec582b3f73e23956b495291c2651539d415e3a3704d1ade9df7fe18914575af0c942aed9096

    • SSDEEP

      3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks