General

  • Target

    8b681d44a41708d3a9fa9fee92bcd9c9345833adb805f75d9b3f4a2a00f5fbaf

  • Size

    524KB

  • Sample

    240428-3rq9cacd9v

  • MD5

    a5122f510a5e610a56496a523a64358b

  • SHA1

    d676ba57661874969d09280da13ce195f7102575

  • SHA256

    8b681d44a41708d3a9fa9fee92bcd9c9345833adb805f75d9b3f4a2a00f5fbaf

  • SHA512

    fa0cc29c300cf71a6a5e67bed195db3df170db9a37ab44b40fe7eb16d5e8a0c71474dbf60022cf60fca18f0807cbd2f0c97dbaa3534cd4350708678e0f57ade3

  • SSDEEP

    6144:/rTfUHeeSKOS9ccFKk3Y9t9YZsniYz1MpA5ns/hCvYlP:/n8yN0Mr8ZsiI1z5nECc

Malware Config

Targets

    • Target

      8b681d44a41708d3a9fa9fee92bcd9c9345833adb805f75d9b3f4a2a00f5fbaf

    • Size

      524KB

    • MD5

      a5122f510a5e610a56496a523a64358b

    • SHA1

      d676ba57661874969d09280da13ce195f7102575

    • SHA256

      8b681d44a41708d3a9fa9fee92bcd9c9345833adb805f75d9b3f4a2a00f5fbaf

    • SHA512

      fa0cc29c300cf71a6a5e67bed195db3df170db9a37ab44b40fe7eb16d5e8a0c71474dbf60022cf60fca18f0807cbd2f0c97dbaa3534cd4350708678e0f57ade3

    • SSDEEP

      6144:/rTfUHeeSKOS9ccFKk3Y9t9YZsniYz1MpA5ns/hCvYlP:/n8yN0Mr8ZsiI1z5nECc

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks