General

  • Target

    13d5fa20f4707ff009cadd2738435ef03bb6c6f40e60de44aae8793b4bc827e3

  • Size

    404KB

  • Sample

    240428-cqw54aea95

  • MD5

    ec14be15d46ab03decccfa148bfad9a2

  • SHA1

    3091a4a3d5b40f98f8229a44f3bc3cad6afa08ad

  • SHA256

    13d5fa20f4707ff009cadd2738435ef03bb6c6f40e60de44aae8793b4bc827e3

  • SHA512

    99fa433f716e00df960618b9aca2119caf7d356904b6a776789f5dbc6d339e2740337848011b6a9682b848c17e85e3e5e02358656ff0e8b83b5b9a0dbc67828f

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4P:gtRfJcNYFNm8UhlZGseP

Malware Config

Targets

    • Target

      13d5fa20f4707ff009cadd2738435ef03bb6c6f40e60de44aae8793b4bc827e3

    • Size

      404KB

    • MD5

      ec14be15d46ab03decccfa148bfad9a2

    • SHA1

      3091a4a3d5b40f98f8229a44f3bc3cad6afa08ad

    • SHA256

      13d5fa20f4707ff009cadd2738435ef03bb6c6f40e60de44aae8793b4bc827e3

    • SHA512

      99fa433f716e00df960618b9aca2119caf7d356904b6a776789f5dbc6d339e2740337848011b6a9682b848c17e85e3e5e02358656ff0e8b83b5b9a0dbc67828f

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4P:gtRfJcNYFNm8UhlZGseP

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks