General

  • Target

    4a3019c18c1658db774e6874d03251cf6b19b227219059a0d6e54d4a2f1310bc

  • Size

    405KB

  • Sample

    240510-17l88aff93

  • MD5

    49ffad38cebcea0e11bf0fe28164010f

  • SHA1

    de3c765f8dcb12448a8ff3daeee7228b3eec1a02

  • SHA256

    4a3019c18c1658db774e6874d03251cf6b19b227219059a0d6e54d4a2f1310bc

  • SHA512

    8f6dfd505800c3108c3d58183c7f5c567eca22e71eebfa76a6da4e2ad799beda2d2c82c953dc65a00998dc80621946d4429893d6e5dfd6ceb1d4df872f3a4f52

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

Malware Config

Targets

    • Target

      4a3019c18c1658db774e6874d03251cf6b19b227219059a0d6e54d4a2f1310bc

    • Size

      405KB

    • MD5

      49ffad38cebcea0e11bf0fe28164010f

    • SHA1

      de3c765f8dcb12448a8ff3daeee7228b3eec1a02

    • SHA256

      4a3019c18c1658db774e6874d03251cf6b19b227219059a0d6e54d4a2f1310bc

    • SHA512

      8f6dfd505800c3108c3d58183c7f5c567eca22e71eebfa76a6da4e2ad799beda2d2c82c953dc65a00998dc80621946d4429893d6e5dfd6ceb1d4df872f3a4f52

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks