General

  • Target

    bccbe3ba00289fce2b84c7ef83c41f0e

  • Size

    97KB

  • Sample

    240309-ztzrqaag41

  • MD5

    bccbe3ba00289fce2b84c7ef83c41f0e

  • SHA1

    a2d5e8c9944290bede8ea804edf6cc7ce191c71d

  • SHA256

    cbba9a134cdef85bed1081a062a5e25dbbdafff135f49e2308109bd9f98c762b

  • SHA512

    5d9a7f87d053939d4b98ba7e6e96d31a8591fb22f6a7745ca9ad5a73e238c5dfc63582d3f5aee9a9882b6a12a100e6324fd61f6c5ad144e6b30378c3c5db83b4

  • SSDEEP

    3072:SKcWmjRrz36pUM2JvQoZqagTF++aSdy7xGPUH4q:hGVK5TwoP49

Malware Config

Targets

    • Target

      bccbe3ba00289fce2b84c7ef83c41f0e

    • Size

      97KB

    • MD5

      bccbe3ba00289fce2b84c7ef83c41f0e

    • SHA1

      a2d5e8c9944290bede8ea804edf6cc7ce191c71d

    • SHA256

      cbba9a134cdef85bed1081a062a5e25dbbdafff135f49e2308109bd9f98c762b

    • SHA512

      5d9a7f87d053939d4b98ba7e6e96d31a8591fb22f6a7745ca9ad5a73e238c5dfc63582d3f5aee9a9882b6a12a100e6324fd61f6c5ad144e6b30378c3c5db83b4

    • SSDEEP

      3072:SKcWmjRrz36pUM2JvQoZqagTF++aSdy7xGPUH4q:hGVK5TwoP49

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks