General

  • Target

    cb389aa95bddc36681c4bec373cea992293c7cb74bb82e12fc5093717668c004

  • Size

    387KB

  • Sample

    240505-e1ed5seh2z

  • MD5

    b40cc25ce8b65b2adf2918ac2f8b28be

  • SHA1

    a450334c4a769a7928e0fbac2c3d1035bd9eb832

  • SHA256

    cb389aa95bddc36681c4bec373cea992293c7cb74bb82e12fc5093717668c004

  • SHA512

    76dbafacfdca63cbe1ae14468466671c198b27b2d349f92587d027c60e2627996986c048d6e8e7c5d47f5dee29650bf794af9400a966983546bc1e67c6dfad23

  • SSDEEP

    6144:9rTfUHeeSKOS9ccFKk3Y9t9YZVS2Fzi/k:9n8yN0Mr8ZLFzi/k

Malware Config

Targets

    • Target

      cb389aa95bddc36681c4bec373cea992293c7cb74bb82e12fc5093717668c004

    • Size

      387KB

    • MD5

      b40cc25ce8b65b2adf2918ac2f8b28be

    • SHA1

      a450334c4a769a7928e0fbac2c3d1035bd9eb832

    • SHA256

      cb389aa95bddc36681c4bec373cea992293c7cb74bb82e12fc5093717668c004

    • SHA512

      76dbafacfdca63cbe1ae14468466671c198b27b2d349f92587d027c60e2627996986c048d6e8e7c5d47f5dee29650bf794af9400a966983546bc1e67c6dfad23

    • SSDEEP

      6144:9rTfUHeeSKOS9ccFKk3Y9t9YZVS2Fzi/k:9n8yN0Mr8ZLFzi/k

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks