General

  • Target

    531064445a495bc0d098b6e5076b4450808b04bba1285d2bdb0188bf6921a06c

  • Size

    3.1MB

  • Sample

    240422-1ymhmaha3y

  • MD5

    7c9c9fbf513708c1b3998097b4a444cf

  • SHA1

    7089e60adaaca341f273df30e645f3efc2026a9c

  • SHA256

    531064445a495bc0d098b6e5076b4450808b04bba1285d2bdb0188bf6921a06c

  • SHA512

    8f7d3a4e728ab8f7d82eb00730a802cd58e614259c85e401b06651faa867345d57bdf04c857336f014853efbf87442fd3de7b1faa8c8a116017b8939a3aecd30

  • SSDEEP

    98304:/HgNDfXQ1veFPk5FaoCRrgGUDxcqj2FAQL:GDfgZeVmCJWlc17

Malware Config

Targets

    • Target

      531064445a495bc0d098b6e5076b4450808b04bba1285d2bdb0188bf6921a06c

    • Size

      3.1MB

    • MD5

      7c9c9fbf513708c1b3998097b4a444cf

    • SHA1

      7089e60adaaca341f273df30e645f3efc2026a9c

    • SHA256

      531064445a495bc0d098b6e5076b4450808b04bba1285d2bdb0188bf6921a06c

    • SHA512

      8f7d3a4e728ab8f7d82eb00730a802cd58e614259c85e401b06651faa867345d57bdf04c857336f014853efbf87442fd3de7b1faa8c8a116017b8939a3aecd30

    • SSDEEP

      98304:/HgNDfXQ1veFPk5FaoCRrgGUDxcqj2FAQL:GDfgZeVmCJWlc17

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks