General

  • Target

    980a9497853b1a2da059d7e580c99bfe4157611736463886816e6b554c8ac66c

  • Size

    2.8MB

  • Sample

    240417-b9762abh8z

  • MD5

    54e405b6c63124e8e8bdac6c19f7074f

  • SHA1

    b77508e19193128a96818d5b7f64f33b7e82a00d

  • SHA256

    980a9497853b1a2da059d7e580c99bfe4157611736463886816e6b554c8ac66c

  • SHA512

    d0aa6946ae6447009c26b47d18e47f69c8c3d5fd606ac0e69ea35ffbac9f2eecce705065476437a9e2f57d385a7b1755bb42a24747c914bada8b47b21c8465be

  • SSDEEP

    49152:DJf1jyUfTxyoxRdFP9cQdFdBFzTpILGNb9B4uf5p3A8G2FPMjhSi9cMsFjvy:DJtGF43lLbFfIuDwgFPMDsFjy

Malware Config

Targets

    • Target

      980a9497853b1a2da059d7e580c99bfe4157611736463886816e6b554c8ac66c

    • Size

      2.8MB

    • MD5

      54e405b6c63124e8e8bdac6c19f7074f

    • SHA1

      b77508e19193128a96818d5b7f64f33b7e82a00d

    • SHA256

      980a9497853b1a2da059d7e580c99bfe4157611736463886816e6b554c8ac66c

    • SHA512

      d0aa6946ae6447009c26b47d18e47f69c8c3d5fd606ac0e69ea35ffbac9f2eecce705065476437a9e2f57d385a7b1755bb42a24747c914bada8b47b21c8465be

    • SSDEEP

      49152:DJf1jyUfTxyoxRdFP9cQdFdBFzTpILGNb9B4uf5p3A8G2FPMjhSi9cMsFjvy:DJtGF43lLbFfIuDwgFPMDsFjy

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks