General

  • Target

    29cba573c0c82de7802f48fd5909eab61316a043bd09f1772c9b9fa471729762

  • Size

    346KB

  • Sample

    240403-yc4hxaba74

  • MD5

    23f0d699bb7f1f116bfe152ecf7e0e6b

  • SHA1

    9f4e27825bf609b2a534eaba9faef1e63d2c85d1

  • SHA256

    29cba573c0c82de7802f48fd5909eab61316a043bd09f1772c9b9fa471729762

  • SHA512

    f91ef1c0052eb16ebe205ebfbfe349cce642548d735448d429255abb00b8d9a0001e6913822e392b3220c2ae8d63b0e7991f1c8b7b5d1fd1b2a8db17e89f6ca9

  • SSDEEP

    6144:/rTfUHeeSKOS9ccFKk3Y9t9YZ6joMa7jhEl859:/n8yN0Mr8Z6jbU9

Malware Config

Targets

    • Target

      29cba573c0c82de7802f48fd5909eab61316a043bd09f1772c9b9fa471729762

    • Size

      346KB

    • MD5

      23f0d699bb7f1f116bfe152ecf7e0e6b

    • SHA1

      9f4e27825bf609b2a534eaba9faef1e63d2c85d1

    • SHA256

      29cba573c0c82de7802f48fd5909eab61316a043bd09f1772c9b9fa471729762

    • SHA512

      f91ef1c0052eb16ebe205ebfbfe349cce642548d735448d429255abb00b8d9a0001e6913822e392b3220c2ae8d63b0e7991f1c8b7b5d1fd1b2a8db17e89f6ca9

    • SSDEEP

      6144:/rTfUHeeSKOS9ccFKk3Y9t9YZ6joMa7jhEl859:/n8yN0Mr8Z6jbU9

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks