General

  • Target

    ad2b14433fcc95acfa41bcda4a7f287b60c956114fcf476396dc4a8df2030eda

  • Size

    224KB

  • Sample

    240419-b4trfsec4z

  • MD5

    7bd5164ee78d24c88b50a2f902e2d9aa

  • SHA1

    552ac1b320c0feb3e3de70c90ff4cea41d17c1d7

  • SHA256

    ad2b14433fcc95acfa41bcda4a7f287b60c956114fcf476396dc4a8df2030eda

  • SHA512

    5ded8db0954d667e133e566abb0c5194582b0f8568ee49094832f2369cac2cd1997fc58a88948d84f2786fa38ededc507f3a1c5b192b46e8358bcc6eef2e7c1c

  • SSDEEP

    6144:sXJ88CQbV3dj3rHwzBt5vxcalHqqFJqokNbb8pWd1DO:ahCQbR5Ut5r8okN1U

Malware Config

Targets

    • Target

      ad2b14433fcc95acfa41bcda4a7f287b60c956114fcf476396dc4a8df2030eda

    • Size

      224KB

    • MD5

      7bd5164ee78d24c88b50a2f902e2d9aa

    • SHA1

      552ac1b320c0feb3e3de70c90ff4cea41d17c1d7

    • SHA256

      ad2b14433fcc95acfa41bcda4a7f287b60c956114fcf476396dc4a8df2030eda

    • SHA512

      5ded8db0954d667e133e566abb0c5194582b0f8568ee49094832f2369cac2cd1997fc58a88948d84f2786fa38ededc507f3a1c5b192b46e8358bcc6eef2e7c1c

    • SSDEEP

      6144:sXJ88CQbV3dj3rHwzBt5vxcalHqqFJqokNbb8pWd1DO:ahCQbR5Ut5r8okN1U

    • Detects executables containing base64 encoded User Agent

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks