General

  • Target

    d493450c29cb54fd81c5971be971c37bf851c2b20381de93d3fb1a229e289423

  • Size

    73KB

  • Sample

    240509-e4cdysag2z

  • MD5

    cdecbd3dc425592b7d46532e821985cd

  • SHA1

    cc54dec67dfcfb6e611cc801b5c18d38b08c6ba6

  • SHA256

    d493450c29cb54fd81c5971be971c37bf851c2b20381de93d3fb1a229e289423

  • SHA512

    981d831ac7234d694ac5d69ef2fea0f1371c8a70429b43509853b39f886da6a57c9af7ec8f6136fdde4aeaa216266c36242ec82d95c7cd707d22424204b9ad7e

  • SSDEEP

    768:qGHV45EDE477AZbUJx0rZGE3jCELoiMMj6hZ3nE+EXVmkDbjRL8Khc15Z6J1Si:qG14P477AxUYrZGoC09k0SkTRHhWqPL

Malware Config

Targets

    • Target

      d493450c29cb54fd81c5971be971c37bf851c2b20381de93d3fb1a229e289423

    • Size

      73KB

    • MD5

      cdecbd3dc425592b7d46532e821985cd

    • SHA1

      cc54dec67dfcfb6e611cc801b5c18d38b08c6ba6

    • SHA256

      d493450c29cb54fd81c5971be971c37bf851c2b20381de93d3fb1a229e289423

    • SHA512

      981d831ac7234d694ac5d69ef2fea0f1371c8a70429b43509853b39f886da6a57c9af7ec8f6136fdde4aeaa216266c36242ec82d95c7cd707d22424204b9ad7e

    • SSDEEP

      768:qGHV45EDE477AZbUJx0rZGE3jCELoiMMj6hZ3nE+EXVmkDbjRL8Khc15Z6J1Si:qG14P477AxUYrZGoC09k0SkTRHhWqPL

    • Detects executables containing base64 encoded User Agent

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks