General

  • Target

    e697b9a39424d614227734b8f16d12639ebb6a0e242b175ab0d7b9eb487b4750

  • Size

    256KB

  • Sample

    240327-b17txacc8z

  • MD5

    65d289ad42db84d3caec95a278c15525

  • SHA1

    c5987651fe5e74941b59f50c25cd0d6e716b05cf

  • SHA256

    e697b9a39424d614227734b8f16d12639ebb6a0e242b175ab0d7b9eb487b4750

  • SHA512

    121da2383719a57dc25a7bff6c3e6c6ada96975b5b3fd554c5fe3c35d9f6428f84294f308494dd95994d271ca0f39598ebdd4343eb14b537dab35736bb7e6184

  • SSDEEP

    6144:uf4/sJYWEbhtwaBV5ZFDQH7i6aEaS/vsd9YoeVjN:uf4QlGD3BV5ZFDfSRsd9YRBN

Malware Config

Targets

    • Target

      e697b9a39424d614227734b8f16d12639ebb6a0e242b175ab0d7b9eb487b4750

    • Size

      256KB

    • MD5

      65d289ad42db84d3caec95a278c15525

    • SHA1

      c5987651fe5e74941b59f50c25cd0d6e716b05cf

    • SHA256

      e697b9a39424d614227734b8f16d12639ebb6a0e242b175ab0d7b9eb487b4750

    • SHA512

      121da2383719a57dc25a7bff6c3e6c6ada96975b5b3fd554c5fe3c35d9f6428f84294f308494dd95994d271ca0f39598ebdd4343eb14b537dab35736bb7e6184

    • SSDEEP

      6144:uf4/sJYWEbhtwaBV5ZFDQH7i6aEaS/vsd9YoeVjN:uf4QlGD3BV5ZFDfSRsd9YRBN

    • Detects executables containing base64 encoded User Agent

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks