General

  • Target

    9e980015e7408ce926877f87dc74968074efd6799f504ad5f897859f20ae1d7e

  • Size

    404KB

  • Sample

    240428-drrgnseh23

  • MD5

    33cb8e9c63b432dffff8cbe5d8e54691

  • SHA1

    82ea086cdad2ccf1c5b5457424b1d06c51b7b494

  • SHA256

    9e980015e7408ce926877f87dc74968074efd6799f504ad5f897859f20ae1d7e

  • SHA512

    71b6f806e4a16f7049212aad7d65a8ce7bcc392ccf49c61fce9a3fcc5e96c80b0c3c777c0ee90b46cff9fb6c14bcb48a1fe5f8d8e038e294cc7809c22954dd00

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4O:gtRfJcNYFNm8UhlZGseO

Malware Config

Targets

    • Target

      9e980015e7408ce926877f87dc74968074efd6799f504ad5f897859f20ae1d7e

    • Size

      404KB

    • MD5

      33cb8e9c63b432dffff8cbe5d8e54691

    • SHA1

      82ea086cdad2ccf1c5b5457424b1d06c51b7b494

    • SHA256

      9e980015e7408ce926877f87dc74968074efd6799f504ad5f897859f20ae1d7e

    • SHA512

      71b6f806e4a16f7049212aad7d65a8ce7bcc392ccf49c61fce9a3fcc5e96c80b0c3c777c0ee90b46cff9fb6c14bcb48a1fe5f8d8e038e294cc7809c22954dd00

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4O:gtRfJcNYFNm8UhlZGseO

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks