General

  • Target

    0e095c3092315573dfadd39e8ca0d7f4d300f207837b8ae5f6e5412f906fbdd9

  • Size

    403KB

  • Sample

    240410-dmxswsfg6y

  • MD5

    425368e2d60f948abb74bb3cc93140da

  • SHA1

    786a4092d9c50c39d28d30587ac62c9959c426e0

  • SHA256

    0e095c3092315573dfadd39e8ca0d7f4d300f207837b8ae5f6e5412f906fbdd9

  • SHA512

    0b7eff963a9c9ef76f300167c6abf4108cdbe25a7456fbcabce51912f26ad68c16304a00e3cf24cec9198a631f3acfeb69f482ad881c4e817f9b389ebee84196

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4g:gtRfJcNYFNm8UhlZGseg

Malware Config

Targets

    • Target

      0e095c3092315573dfadd39e8ca0d7f4d300f207837b8ae5f6e5412f906fbdd9

    • Size

      403KB

    • MD5

      425368e2d60f948abb74bb3cc93140da

    • SHA1

      786a4092d9c50c39d28d30587ac62c9959c426e0

    • SHA256

      0e095c3092315573dfadd39e8ca0d7f4d300f207837b8ae5f6e5412f906fbdd9

    • SHA512

      0b7eff963a9c9ef76f300167c6abf4108cdbe25a7456fbcabce51912f26ad68c16304a00e3cf24cec9198a631f3acfeb69f482ad881c4e817f9b389ebee84196

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4g:gtRfJcNYFNm8UhlZGseg

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks