General

  • Target

    b5f8a6d0a2da6ff8bd066ba1bee1e251c9cb5f7b95c0203dd7b9eff0f6d49f84

  • Size

    48KB

  • Sample

    240505-rqxtysce51

  • MD5

    f58392d3f546844c5fde4ce20f54d505

  • SHA1

    b7747a0d7ccc4d43b5a052e260e158813eaddf32

  • SHA256

    b5f8a6d0a2da6ff8bd066ba1bee1e251c9cb5f7b95c0203dd7b9eff0f6d49f84

  • SHA512

    ea77178e0ffbab9a9c29409c505d1f3c1b0b4ec2ef6643fcdd2806ca1ea5c1327c97338e3f755db239e103c800648828c27b899cb9bf8f87aabaa185a94d503e

  • SSDEEP

    1536:PssaYzMXqtGNttyUn01Q78a4RWHqaNrFd:PssaY46tGNttyJQ7KR7aNpd

Score
8/10

Malware Config

Targets

    • Target

      b5f8a6d0a2da6ff8bd066ba1bee1e251c9cb5f7b95c0203dd7b9eff0f6d49f84

    • Size

      48KB

    • MD5

      f58392d3f546844c5fde4ce20f54d505

    • SHA1

      b7747a0d7ccc4d43b5a052e260e158813eaddf32

    • SHA256

      b5f8a6d0a2da6ff8bd066ba1bee1e251c9cb5f7b95c0203dd7b9eff0f6d49f84

    • SHA512

      ea77178e0ffbab9a9c29409c505d1f3c1b0b4ec2ef6643fcdd2806ca1ea5c1327c97338e3f755db239e103c800648828c27b899cb9bf8f87aabaa185a94d503e

    • SSDEEP

      1536:PssaYzMXqtGNttyUn01Q78a4RWHqaNrFd:PssaY46tGNttyJQ7KR7aNpd

    Score
    8/10
    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks