General

  • Target

    aee6721e54d009d543e817489424e8a06f236d753ed26014f396dbae065d7273

  • Size

    3.1MB

  • Sample

    240416-bd1r3sfa7w

  • MD5

    1baebb78f58650b67fceda3a082aac53

  • SHA1

    1cbbce335606c3b92882c138324dfb7c52f68573

  • SHA256

    aee6721e54d009d543e817489424e8a06f236d753ed26014f396dbae065d7273

  • SHA512

    090a54b3a56abde81d771ff1f258732b255a8870b1a468e0e7a92a4ab4faff9046a6809f20c73968ae95d72a57b313872e760b3e6096e50714ae2daf5e454e6a

  • SSDEEP

    98304:6HgNDfXQ1veFPk5FaoCRrgGUDxjDU5J9ws+:3DfgZeVmCJWljA1ws

Malware Config

Targets

    • Target

      aee6721e54d009d543e817489424e8a06f236d753ed26014f396dbae065d7273

    • Size

      3.1MB

    • MD5

      1baebb78f58650b67fceda3a082aac53

    • SHA1

      1cbbce335606c3b92882c138324dfb7c52f68573

    • SHA256

      aee6721e54d009d543e817489424e8a06f236d753ed26014f396dbae065d7273

    • SHA512

      090a54b3a56abde81d771ff1f258732b255a8870b1a468e0e7a92a4ab4faff9046a6809f20c73968ae95d72a57b313872e760b3e6096e50714ae2daf5e454e6a

    • SSDEEP

      98304:6HgNDfXQ1veFPk5FaoCRrgGUDxjDU5J9ws+:3DfgZeVmCJWljA1ws

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks