General

  • Target

    14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196

  • Size

    6.6MB

  • Sample

    240410-lrxbxseb6t

  • MD5

    5f6aacd3106f727d45c295fd0f25054d

  • SHA1

    0d584d72fe321332df0b0a17720191ad96737f47

  • SHA256

    14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196

  • SHA512

    8eaa103be426a037b5ee1b99b0949672af1b674491dab8d5f24f5bf6f13e5817800574c0c779d54ef1f9ada7a6150ba3a6a63bf90eb6a5885465f6e2275764b0

  • SSDEEP

    98304:QSiEgahK0fCLAeApJe/i7t5/xPUa5BDul4X0CnewymF+ATMM9LWmZSWNQs5Ia/Ba:T/PfCEl5o3TwymFrX9L5sWB0Uy

Malware Config

Targets

    • Target

      14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196

    • Size

      6.6MB

    • MD5

      5f6aacd3106f727d45c295fd0f25054d

    • SHA1

      0d584d72fe321332df0b0a17720191ad96737f47

    • SHA256

      14bde11c50a2df2401831fea50760dd6cf9a492a3a98753ab3b1c6ce4d079196

    • SHA512

      8eaa103be426a037b5ee1b99b0949672af1b674491dab8d5f24f5bf6f13e5817800574c0c779d54ef1f9ada7a6150ba3a6a63bf90eb6a5885465f6e2275764b0

    • SSDEEP

      98304:QSiEgahK0fCLAeApJe/i7t5/xPUa5BDul4X0CnewymF+ATMM9LWmZSWNQs5Ia/Ba:T/PfCEl5o3TwymFrX9L5sWB0Uy

    • Babadeda

      Babadeda is a crypter delivered as a legitimate installer and used to drop other malware families.

    • Babadeda Crypter

    • OutSteel

      OutSteel is a file uploader and document stealer written in AutoIT.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • AutoIT Executable

      AutoIT scripts compiled to PE executables.

MITRE ATT&CK Enterprise v15

Tasks