General

  • Target

    9a4e9e734733ef52767bbadc94a028cb5785703e42027aebbaea9416acdf6f51

  • Size

    130KB

  • Sample

    240407-ypys7ada3w

  • MD5

    9bd6a8b6a72d058386cca6728c19b40d

  • SHA1

    722164902147c79a9988f1d6c84849eece0d3c77

  • SHA256

    9a4e9e734733ef52767bbadc94a028cb5785703e42027aebbaea9416acdf6f51

  • SHA512

    169d130b922d07abdb710c1ba3f136727e0773568ff5c0e54f9b1303c6b7c5af7d5ca857b4117469b9a640c502c27846c9fd39ebcf91a4621016152b47be3ddd

  • SSDEEP

    3072:PVaY46tGNttyJQ7KRHvgmJAIlwPxX/ZWOFrb:346tGdyuvI+PxBWOFn

Score
8/10

Malware Config

Targets

    • Target

      9a4e9e734733ef52767bbadc94a028cb5785703e42027aebbaea9416acdf6f51

    • Size

      130KB

    • MD5

      9bd6a8b6a72d058386cca6728c19b40d

    • SHA1

      722164902147c79a9988f1d6c84849eece0d3c77

    • SHA256

      9a4e9e734733ef52767bbadc94a028cb5785703e42027aebbaea9416acdf6f51

    • SHA512

      169d130b922d07abdb710c1ba3f136727e0773568ff5c0e54f9b1303c6b7c5af7d5ca857b4117469b9a640c502c27846c9fd39ebcf91a4621016152b47be3ddd

    • SSDEEP

      3072:PVaY46tGNttyJQ7KRHvgmJAIlwPxX/ZWOFrb:346tGdyuvI+PxBWOFn

    Score
    8/10
    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks