General

  • Target

    8a693028e75f17558c0a15fbf883e9dfca18bb6a1070847c297c6d5f8a8ad2ef

  • Size

    404KB

  • Sample

    240428-crg3kaeb28

  • MD5

    5d241bc2a57001a7e05b2b4fc5ff77c1

  • SHA1

    c9baf4b9e6a467f76dcb754ac59e5e77afc63eda

  • SHA256

    8a693028e75f17558c0a15fbf883e9dfca18bb6a1070847c297c6d5f8a8ad2ef

  • SHA512

    145cd39c76c826d3a5a60b5570b513b38a6e5959a2165f9682ce275c0841420e48a8d3cb1f3bf127fa314cf0d93339540ecbf84b3613e68b04f92925f31ca6b1

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

Malware Config

Targets

    • Target

      8a693028e75f17558c0a15fbf883e9dfca18bb6a1070847c297c6d5f8a8ad2ef

    • Size

      404KB

    • MD5

      5d241bc2a57001a7e05b2b4fc5ff77c1

    • SHA1

      c9baf4b9e6a467f76dcb754ac59e5e77afc63eda

    • SHA256

      8a693028e75f17558c0a15fbf883e9dfca18bb6a1070847c297c6d5f8a8ad2ef

    • SHA512

      145cd39c76c826d3a5a60b5570b513b38a6e5959a2165f9682ce275c0841420e48a8d3cb1f3bf127fa314cf0d93339540ecbf84b3613e68b04f92925f31ca6b1

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks