General

  • Target

    31ccb432ef993ef7f6f0b93b40acd82e60fdb68d2e22caf9136a309ae8b48fbb

  • Size

    258KB

  • Sample

    240407-ymw7ksch7t

  • MD5

    228f9a79c7e292936499db648288cb55

  • SHA1

    0d9b05f70a4ac7bdaa4c4b584833270db3cc9771

  • SHA256

    31ccb432ef993ef7f6f0b93b40acd82e60fdb68d2e22caf9136a309ae8b48fbb

  • SHA512

    bb8d2f25d4a05419a8cb13155feb3418f24986a63b3ca0f9d87d8a0015d34e46e0b787a7bae3b399b2224c10954cc77fb1df2cdb8adb90ec1a8bdf6e324a0452

  • SSDEEP

    6144:R+aX3u6gT9oqgiC4bXqsTk90qC1AOb7eswf1Px++fD8PJ:R+a9gx4itXqsTkiR7twRx+gD8PJ

Score
7/10

Malware Config

Targets

    • Target

      31ccb432ef993ef7f6f0b93b40acd82e60fdb68d2e22caf9136a309ae8b48fbb

    • Size

      258KB

    • MD5

      228f9a79c7e292936499db648288cb55

    • SHA1

      0d9b05f70a4ac7bdaa4c4b584833270db3cc9771

    • SHA256

      31ccb432ef993ef7f6f0b93b40acd82e60fdb68d2e22caf9136a309ae8b48fbb

    • SHA512

      bb8d2f25d4a05419a8cb13155feb3418f24986a63b3ca0f9d87d8a0015d34e46e0b787a7bae3b399b2224c10954cc77fb1df2cdb8adb90ec1a8bdf6e324a0452

    • SSDEEP

      6144:R+aX3u6gT9oqgiC4bXqsTk90qC1AOb7eswf1Px++fD8PJ:R+a9gx4itXqsTkiR7twRx+gD8PJ

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks