General

  • Target

    4162c64196d0d349bd8f386c4963adddfba36cf26b5cbc84fce4a64789d938ae

  • Size

    404KB

  • Sample

    240428-y1c1vsga83

  • MD5

    17e020e9cf81dc12bd3d26c4fd545347

  • SHA1

    4c4d58945290b7f2cb621a6a3c9e823f5a52e72a

  • SHA256

    4162c64196d0d349bd8f386c4963adddfba36cf26b5cbc84fce4a64789d938ae

  • SHA512

    c203a6d676ef996dd679174101d20b1bfb22fd8bdd486ccde95fd1d608e41cea6d3fb72e6cee952391b9399b24dc0f023a7113a1fbf67298095998ca57fb6075

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4s:gtRfJcNYFNm8UhlZGses

Malware Config

Targets

    • Target

      4162c64196d0d349bd8f386c4963adddfba36cf26b5cbc84fce4a64789d938ae

    • Size

      404KB

    • MD5

      17e020e9cf81dc12bd3d26c4fd545347

    • SHA1

      4c4d58945290b7f2cb621a6a3c9e823f5a52e72a

    • SHA256

      4162c64196d0d349bd8f386c4963adddfba36cf26b5cbc84fce4a64789d938ae

    • SHA512

      c203a6d676ef996dd679174101d20b1bfb22fd8bdd486ccde95fd1d608e41cea6d3fb72e6cee952391b9399b24dc0f023a7113a1fbf67298095998ca57fb6075

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4s:gtRfJcNYFNm8UhlZGses

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks