General

  • Target

    df994f4133219245a605ae185249bb730d1e22412c2c3e6c40dfd4d58bc43321

  • Size

    162KB

  • Sample

    240407-xs9jescc25

  • MD5

    8cd53a17226141a2dc63c007ed764d66

  • SHA1

    561f6c80e45c5083605030f864794fbfa700fc0c

  • SHA256

    df994f4133219245a605ae185249bb730d1e22412c2c3e6c40dfd4d58bc43321

  • SHA512

    2f39a6105efdf839dac58d1b5d92f18da6ec2c3ea1937ec0787b301f41cd60707b09fcd5b2a7c68cbb18e9c8a25e4f23ff674596e3d68d38469a780348d334e4

  • SSDEEP

    3072:APRe+aX3rX9DIQekqnwLD9m0WjfuRRfEdj4E3f90bC:1+aX3rX1IQek9if1Vv+W

Score
7/10

Malware Config

Targets

    • Target

      df994f4133219245a605ae185249bb730d1e22412c2c3e6c40dfd4d58bc43321

    • Size

      162KB

    • MD5

      8cd53a17226141a2dc63c007ed764d66

    • SHA1

      561f6c80e45c5083605030f864794fbfa700fc0c

    • SHA256

      df994f4133219245a605ae185249bb730d1e22412c2c3e6c40dfd4d58bc43321

    • SHA512

      2f39a6105efdf839dac58d1b5d92f18da6ec2c3ea1937ec0787b301f41cd60707b09fcd5b2a7c68cbb18e9c8a25e4f23ff674596e3d68d38469a780348d334e4

    • SSDEEP

      3072:APRe+aX3rX9DIQekqnwLD9m0WjfuRRfEdj4E3f90bC:1+aX3rX1IQek9if1Vv+W

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks