General

  • Target

    WinDirStat.cameyo.exe

  • Size

    5.4MB

  • Sample

    240408-mksktsfa37

  • MD5

    f16e0f20a1059e4998307fc3b465c48e

  • SHA1

    d12eacffb0510cdabb1b4d71e41095eda9a9bf6b

  • SHA256

    1aeadd204334690d1039fde21322ee0158d8a15e3ad7a31b18ad913860f6c1cd

  • SHA512

    542016071ec8210c6b0f9975c020bcbe2797d16c923d51f2070eaa23d5d9e5faec6ce0fafa48327396e966766fb451a5045b4d3095ea97907333d3ae755da7e5

  • SSDEEP

    98304:d+A7HUCc7TIeBvQD4cTbXO3W5RuU8wgcdDPRhr:wA76Qee5X+3W5RR5v

Score
7/10

Malware Config

Targets

    • Target

      WinDirStat.cameyo.exe

    • Size

      5.4MB

    • MD5

      f16e0f20a1059e4998307fc3b465c48e

    • SHA1

      d12eacffb0510cdabb1b4d71e41095eda9a9bf6b

    • SHA256

      1aeadd204334690d1039fde21322ee0158d8a15e3ad7a31b18ad913860f6c1cd

    • SHA512

      542016071ec8210c6b0f9975c020bcbe2797d16c923d51f2070eaa23d5d9e5faec6ce0fafa48327396e966766fb451a5045b4d3095ea97907333d3ae755da7e5

    • SSDEEP

      98304:d+A7HUCc7TIeBvQD4cTbXO3W5RuU8wgcdDPRhr:wA76Qee5X+3W5RR5v

    Score
    7/10
    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks