General

  • Target

    eca9c4ff185d22de20dcf5d2bfa70d08034ed65ac2a3060fd35bb65d29ec9886

  • Size

    50KB

  • Sample

    240327-b9wg8shg22

  • MD5

    10be93035136f9e7a26683e956144ea3

  • SHA1

    2bcfe78c32782aa03adabee326895caec8f5d097

  • SHA256

    eca9c4ff185d22de20dcf5d2bfa70d08034ed65ac2a3060fd35bb65d29ec9886

  • SHA512

    e1e1f22ad0b93983e52fcbe8253926646bef9a985d3480a63ba8470ee70e08dce7f5c19061cd58f0e38b4bd4d5b639f7d28112087995d4fe0b2e163cb7e32bef

  • SSDEEP

    384:O4OiBe0lDJW6ZDKDXa55nUK+c9Th28KBA74AiDJAcZUwmgZWQWhcfWGsiqis9Qln:O4zZWX851xLNwWZwmg//iisKl4qR

Malware Config

Targets

    • Target

      eca9c4ff185d22de20dcf5d2bfa70d08034ed65ac2a3060fd35bb65d29ec9886

    • Size

      50KB

    • MD5

      10be93035136f9e7a26683e956144ea3

    • SHA1

      2bcfe78c32782aa03adabee326895caec8f5d097

    • SHA256

      eca9c4ff185d22de20dcf5d2bfa70d08034ed65ac2a3060fd35bb65d29ec9886

    • SHA512

      e1e1f22ad0b93983e52fcbe8253926646bef9a985d3480a63ba8470ee70e08dce7f5c19061cd58f0e38b4bd4d5b639f7d28112087995d4fe0b2e163cb7e32bef

    • SSDEEP

      384:O4OiBe0lDJW6ZDKDXa55nUK+c9Th28KBA74AiDJAcZUwmgZWQWhcfWGsiqis9Qln:O4zZWX851xLNwWZwmg//iisKl4qR

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks