General

  • Target

    2ce280c172aef1fcbd413435e95e825141cecf53dc9b9102d7ba23c14aa49bb7

  • Size

    368KB

  • Sample

    240428-rkeq7ahg9t

  • MD5

    26cc5b1b0fc0f7a9eb52719657186498

  • SHA1

    a121ac4ddc0d6c18c68c8d6a64365bbf3230d5cf

  • SHA256

    2ce280c172aef1fcbd413435e95e825141cecf53dc9b9102d7ba23c14aa49bb7

  • SHA512

    14e11a661e07cc6d2765705443e93e4450238370f3b320a36f271957d9e46f7f55ebf9507b9db39b9142d0298fbcfd8b049e4bddcf1064e3670543b41d1e1db7

  • SSDEEP

    6144:m+aMozU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:m+aMAU66b5zhVymA/XSRh

Score
7/10

Malware Config

Targets

    • Target

      2ce280c172aef1fcbd413435e95e825141cecf53dc9b9102d7ba23c14aa49bb7

    • Size

      368KB

    • MD5

      26cc5b1b0fc0f7a9eb52719657186498

    • SHA1

      a121ac4ddc0d6c18c68c8d6a64365bbf3230d5cf

    • SHA256

      2ce280c172aef1fcbd413435e95e825141cecf53dc9b9102d7ba23c14aa49bb7

    • SHA512

      14e11a661e07cc6d2765705443e93e4450238370f3b320a36f271957d9e46f7f55ebf9507b9db39b9142d0298fbcfd8b049e4bddcf1064e3670543b41d1e1db7

    • SSDEEP

      6144:m+aMozU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:m+aMAU66b5zhVymA/XSRh

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks