General

  • Target

    16502831677.zip

  • Size

    4.3MB

  • Sample

    240410-j96xzahc89

  • MD5

    07a85c028e40bda5f73f895e620105d4

  • SHA1

    9902edc8de23a52814d2dec9223a0b9df1dce477

  • SHA256

    aeac583de2f996861e6a523c6759e9bebb3111d77d98277c207c5448cb8d0da6

  • SHA512

    ee1a129dd079f15c04a1d285b3f862e09e6b0cf67fca491009daa51538305aca69295603a65bf168a343f6dcf65b41f24fb6036bb2436609d316360b1cc1b643

  • SSDEEP

    98304:ITlhtF35eh8cJSinxOe/dVQvM0IMyl6FdK/fcEfV6BRRqerqQNY:ITlnF35E8cJz//dVQgMDyft6h+

Malware Config

Targets

    • Target

      file_transfer_tools.exe

    • Size

      801KB

    • MD5

      41dcc29d7eaba7b84fd54323394712af

    • SHA1

      ddc0100723cc2dc9ae8b02a0cb7fe4a86c02d54b

    • SHA256

      a909bef708a47ae428fedbc566132c56f15ae7511dc460cf22055ec1a72d485a

    • SHA512

      5a3e8c1eda558e0b90470d752490bc4d04610f93e453cbfd9013a363cfdf5e607974d526c49efe2ef0440e241d775b66bd7c48c74ee9e8677a37cdedc30c42ee

    • SSDEEP

      6144:xmbuKA33X1rgMuu+xdaXkW+zF6m8XZPELSrPzA:x6XA33X1rTuuyrVZ6m8XGH

    • Meta Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • MetaStealer payload

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • Target

      job_description_hays.pdf.url

    • Size

      220B

    • MD5

      e51347ab8a588e50f18894671c174104

    • SHA1

      1676b1abbcf1d4e4b80f6edc671dbfae8091cb5f

    • SHA256

      17e1b1186b2b4d4da9ab4321ce09ef5f0d92626e2c6aca8877b6d65c63c088b4

    • SHA512

      29b52e2c2e198a64b6373bbcad5dacd272f77efc4e5d99066fbe30960e2a2d59c9aebe46446744a21cd5556101c6154469cced5547d1e4e4fafcc5ea7de5826e

    Score
    1/10
    • Target

      libcrypto-1_1-x64.dll

    • Size

      4.4MB

    • MD5

      3fb14e936049e2f4102d3d67ffdefc33

    • SHA1

      d3d4363105e45e585ccda505be946ce932a391f2

    • SHA256

      d54e8c1727351fb3065ca2d5043c9667c6243a574fe171a7e75913373c33fb11

    • SHA512

      522706576aca0eb2b8b334705b32d2527287b7dd2c4fa54a64d67996bf295f270e9a10c40431d3c4c020c6728707b9c5a6626b69337ba371e1ede9bd8226c088

    • SSDEEP

      98304:C7j4FpJ88sTWfdnWu5fqlF2VOIAibpP62cCdo1CPwDv3uFfJH:C7j4FpC8sGnWukD2V9x6Kdo1CPwDv3ub

    • Meta Stealer

      Meta Stealer steals passwords stored in browsers, written in C++.

    • MetaStealer payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Modifies file permissions

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Target

      vcruntime140.dll

    • Size

      94KB

    • MD5

      5797d2a762227f35cdd581ec648693a8

    • SHA1

      e587b804db5e95833cbd2229af54c755ee0393b9

    • SHA256

      c51c64dfb7c445ecf0001f69c27e13299ddcfba0780efa72b866a7487b7491c7

    • SHA512

      5c4de4f65c0338f9a63b853db356175cae15c2ddc6b727f473726d69ee0d07545ac64b313c380548211216ea667caf32c5a0fd86f7abe75fc60086822bc4c92e

    • SSDEEP

      1536:yOHL+4KsAzAfadZw+1Hcx8uIYNU5U9H0Q8ecbjt1lLN:yOr/Z+jPYNV9H0Q8ecbjt1j

    Score
    1/10

MITRE ATT&CK Enterprise v15

Tasks