General

  • Target

    537d821ae20091bca9df3b89d52c5f4a5491f9e281d59fcfcdbfb6718d1af479

  • Size

    47KB

  • Sample

    240428-rkc8cshg81

  • MD5

    71ee47f249e24c195d23e02d30915fb1

  • SHA1

    cee911d55fafa45f87cd0784912ba2d376921b9b

  • SHA256

    537d821ae20091bca9df3b89d52c5f4a5491f9e281d59fcfcdbfb6718d1af479

  • SHA512

    9110164c92b8188e48dbaf92dda7a78e9bca618fa94a7436c3b4a4a5ae43c87af54b49f223a010d7d5db7049951ae4fb832ec2c6d511c9c470f6a0e308cc96f4

  • SSDEEP

    768:/IPcTO5RroZJ76739sBWsNscWlM3dN9N3ZjfPPuWQ3655Kv1X/qY1MSd:/wSe+Zk78NR3dN5nPuHqaNrFd

Score
7/10

Malware Config

Targets

    • Target

      537d821ae20091bca9df3b89d52c5f4a5491f9e281d59fcfcdbfb6718d1af479

    • Size

      47KB

    • MD5

      71ee47f249e24c195d23e02d30915fb1

    • SHA1

      cee911d55fafa45f87cd0784912ba2d376921b9b

    • SHA256

      537d821ae20091bca9df3b89d52c5f4a5491f9e281d59fcfcdbfb6718d1af479

    • SHA512

      9110164c92b8188e48dbaf92dda7a78e9bca618fa94a7436c3b4a4a5ae43c87af54b49f223a010d7d5db7049951ae4fb832ec2c6d511c9c470f6a0e308cc96f4

    • SSDEEP

      768:/IPcTO5RroZJ76739sBWsNscWlM3dN9N3ZjfPPuWQ3655Kv1X/qY1MSd:/wSe+Zk78NR3dN5nPuHqaNrFd

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks