General

  • Target

    bfc21c49c19a898c9fd39001e721c03634ebd0fb7a800170e20a74f61177164e

  • Size

    216KB

  • Sample

    240422-c6x3bseg8v

  • MD5

    49a21a87f5b39acab9a20a104f02e7b6

  • SHA1

    4672aee46df932707920206e0b291ada977c124f

  • SHA256

    bfc21c49c19a898c9fd39001e721c03634ebd0fb7a800170e20a74f61177164e

  • SHA512

    072d1c4de957d93255ed81ffc10031fcf5110e40306d6dd9c7cba30920cf16c1edd0724b8c19dcff65ed043eb45823a04cdaf30c5e84cf4419622d5d4a757690

  • SSDEEP

    3072:SPUHpiKT2t2UHIu05W7SAFJJOUD9cckiKop97f3r8n9t9Ygntw+:/rTfUHeeSKOS9ccFKk3Y9t9YZ+

Malware Config

Targets

    • Target

      bfc21c49c19a898c9fd39001e721c03634ebd0fb7a800170e20a74f61177164e

    • Size

      216KB

    • MD5

      49a21a87f5b39acab9a20a104f02e7b6

    • SHA1

      4672aee46df932707920206e0b291ada977c124f

    • SHA256

      bfc21c49c19a898c9fd39001e721c03634ebd0fb7a800170e20a74f61177164e

    • SHA512

      072d1c4de957d93255ed81ffc10031fcf5110e40306d6dd9c7cba30920cf16c1edd0724b8c19dcff65ed043eb45823a04cdaf30c5e84cf4419622d5d4a757690

    • SSDEEP

      3072:SPUHpiKT2t2UHIu05W7SAFJJOUD9cckiKop97f3r8n9t9Ygntw+:/rTfUHeeSKOS9ccFKk3Y9t9YZ+

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks