General

  • Target

    d55ef77b6f6efcf01615ca02b288d8ee4a2e333c2f9508ef6011573e0efd71ce

  • Size

    264KB

  • Sample

    240407-xrfvqabg4s

  • MD5

    cfe0ef4f0a5640cad9a0ad61b79c89c7

  • SHA1

    4735ec6aa5c9f82644065284b47f2256de5b207d

  • SHA256

    d55ef77b6f6efcf01615ca02b288d8ee4a2e333c2f9508ef6011573e0efd71ce

  • SHA512

    60658c7beea688499dbe0b958d2a39e0e3b65495343a9e25b77ec7b740bade6856ae6f54280a70f08d6675b8499dd03eca5854867ea09defab2718e95ac3f87a

  • SSDEEP

    3072:ADe+aX3rX9DqLRkgUA1nQZwFGVO4Mqg+WDY:3+aX3rX1qLRp1nQ4QLd

Score
7/10

Malware Config

Targets

    • Target

      d55ef77b6f6efcf01615ca02b288d8ee4a2e333c2f9508ef6011573e0efd71ce

    • Size

      264KB

    • MD5

      cfe0ef4f0a5640cad9a0ad61b79c89c7

    • SHA1

      4735ec6aa5c9f82644065284b47f2256de5b207d

    • SHA256

      d55ef77b6f6efcf01615ca02b288d8ee4a2e333c2f9508ef6011573e0efd71ce

    • SHA512

      60658c7beea688499dbe0b958d2a39e0e3b65495343a9e25b77ec7b740bade6856ae6f54280a70f08d6675b8499dd03eca5854867ea09defab2718e95ac3f87a

    • SSDEEP

      3072:ADe+aX3rX9DqLRkgUA1nQZwFGVO4Mqg+WDY:3+aX3rX1qLRp1nQ4QLd

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks