General

  • Target

    35995c46e72da847332fd0e646495f67

  • Size

    258KB

  • Sample

    240409-118tmshb9w

  • MD5

    35995c46e72da847332fd0e646495f67

  • SHA1

    8c9ceb038d3b41b53338eb82fae8257564984edb

  • SHA256

    ab7c206455650087394e8d2e5a401d693bf90597684cc6248cb98e6d54aa795e

  • SHA512

    08052404f0ada464a002865f528681c51c0602d333e9beb6ba78b954e63dd324cd31833380c7121b19d13f64f888d541afed4cd5bb5151755b8c488242d72889

  • SSDEEP

    6144:uf4/sJYWEbhtwaBV5ZFDQH7i6aEaS/vsd9YoeVjWR:uf4QlGD3BV5ZFDfSRsd9YRB0

Malware Config

Targets

    • Target

      35995c46e72da847332fd0e646495f67

    • Size

      258KB

    • MD5

      35995c46e72da847332fd0e646495f67

    • SHA1

      8c9ceb038d3b41b53338eb82fae8257564984edb

    • SHA256

      ab7c206455650087394e8d2e5a401d693bf90597684cc6248cb98e6d54aa795e

    • SHA512

      08052404f0ada464a002865f528681c51c0602d333e9beb6ba78b954e63dd324cd31833380c7121b19d13f64f888d541afed4cd5bb5151755b8c488242d72889

    • SSDEEP

      6144:uf4/sJYWEbhtwaBV5ZFDQH7i6aEaS/vsd9YoeVjWR:uf4QlGD3BV5ZFDfSRsd9YRB0

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks