General

  • Target

    764a39a5533d4d34656154c80fc20a2bcab3e93901d00f158db335f30f5d0239

  • Size

    4.2MB

  • Sample

    240322-zt66ssgh54

  • MD5

    73ec39ec810c866be4f7393b751df61f

  • SHA1

    5b7851beeafabb79d4bac78b02e6ab9447193bcb

  • SHA256

    764a39a5533d4d34656154c80fc20a2bcab3e93901d00f158db335f30f5d0239

  • SHA512

    b99d86e9ebad49cbf13e29f3a6cef0e5366bfb4658246282c50a78cbc79e4d00bd63d57044f922ddf6eb80fdf8b6593336572c8036977bbd6a17468ae9b28b7f

  • SSDEEP

    98304:Bsaj8qr2b4ETnwhvGPS2tDQOiFLe+ft7n27D24dW2H6911CPwDv3uFfJ8k:Bsag284uwFQjtUO6S+4rH6D1CPwDv3un

Malware Config

Targets

    • Target

      764a39a5533d4d34656154c80fc20a2bcab3e93901d00f158db335f30f5d0239

    • Size

      4.2MB

    • MD5

      73ec39ec810c866be4f7393b751df61f

    • SHA1

      5b7851beeafabb79d4bac78b02e6ab9447193bcb

    • SHA256

      764a39a5533d4d34656154c80fc20a2bcab3e93901d00f158db335f30f5d0239

    • SHA512

      b99d86e9ebad49cbf13e29f3a6cef0e5366bfb4658246282c50a78cbc79e4d00bd63d57044f922ddf6eb80fdf8b6593336572c8036977bbd6a17468ae9b28b7f

    • SSDEEP

      98304:Bsaj8qr2b4ETnwhvGPS2tDQOiFLe+ft7n27D24dW2H6911CPwDv3uFfJ8k:Bsag284uwFQjtUO6S+4rH6D1CPwDv3un

    • Meta Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • MetaStealer payload

    • Detect binaries embedding considerable number of cryptocurrency wallet browser extension IDs.

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Mark of the Web detected: This indicates that the page was originally saved or cloned.

MITRE ATT&CK Enterprise v15

Tasks