General

  • Target

    d5ed5020a94f3fbc3c9833c48c479627

  • Size

    116KB

  • Sample

    240319-mxjhpaab38

  • MD5

    d5ed5020a94f3fbc3c9833c48c479627

  • SHA1

    0639eda0a394c6e16ad87513d2909be4955bfecc

  • SHA256

    b519c189218b399571eb44b87ce9ac792bc9162015e367c633d89cd979f885e5

  • SHA512

    c55a9dabd233b363349ac3a4b765bcfc6993ab41e97e34c4a0f85e3e1568c5fa219f175184a5d487a9bec51af3eb01995ff1f24c045ff5e71c2386c642972825

  • SSDEEP

    3072:SKcWmjRrz3DHLEPFC5Mn1SYmyk5/3UccNU1R:hGDrOC5M7A5zcNa

Malware Config

Targets

    • Target

      d5ed5020a94f3fbc3c9833c48c479627

    • Size

      116KB

    • MD5

      d5ed5020a94f3fbc3c9833c48c479627

    • SHA1

      0639eda0a394c6e16ad87513d2909be4955bfecc

    • SHA256

      b519c189218b399571eb44b87ce9ac792bc9162015e367c633d89cd979f885e5

    • SHA512

      c55a9dabd233b363349ac3a4b765bcfc6993ab41e97e34c4a0f85e3e1568c5fa219f175184a5d487a9bec51af3eb01995ff1f24c045ff5e71c2386c642972825

    • SSDEEP

      3072:SKcWmjRrz3DHLEPFC5Mn1SYmyk5/3UccNU1R:hGDrOC5M7A5zcNa

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks