General

  • Target

    9e76ea30994355e694f6492e718121c6d3ca6b6f0f3b61280bf466f4fce4a887

  • Size

    205KB

  • Sample

    240328-cdvrhacg8y

  • MD5

    d3a0446cd9a5ebcd60037e3140766dba

  • SHA1

    0a2abc5551d483f27b71a2785dd75ddc7a242199

  • SHA256

    9e76ea30994355e694f6492e718121c6d3ca6b6f0f3b61280bf466f4fce4a887

  • SHA512

    be67d1b34b6934549d85b3bc0f50809bfb8dfb903ae2290367702d49323726deb1e73a531d8c3d4bfc228002feca9efcfaf1baabeccf0ccb6ff9a68039e9ea3e

  • SSDEEP

    3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

Malware Config

Targets

    • Target

      9e76ea30994355e694f6492e718121c6d3ca6b6f0f3b61280bf466f4fce4a887

    • Size

      205KB

    • MD5

      d3a0446cd9a5ebcd60037e3140766dba

    • SHA1

      0a2abc5551d483f27b71a2785dd75ddc7a242199

    • SHA256

      9e76ea30994355e694f6492e718121c6d3ca6b6f0f3b61280bf466f4fce4a887

    • SHA512

      be67d1b34b6934549d85b3bc0f50809bfb8dfb903ae2290367702d49323726deb1e73a531d8c3d4bfc228002feca9efcfaf1baabeccf0ccb6ff9a68039e9ea3e

    • SSDEEP

      3072:fP5gvNVLIfHQja1RfmLQADwSKkhU+tLgT5lODbiC8r1PkT:X2vnSwjaOcADw9cUeCOf

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks