General

  • Target

    1fc71ef97d0185e6db2931bd4974581e283f08ec3356a5dd30f0de9c4f3862a7

  • Size

    73KB

  • Sample

    240512-yh6kfsdd7y

  • MD5

    b03ea6a2e0258d400b11472beca2152f

  • SHA1

    ac1442017b007f82f739fb7b67451b795a95a90e

  • SHA256

    1fc71ef97d0185e6db2931bd4974581e283f08ec3356a5dd30f0de9c4f3862a7

  • SHA512

    1df38aa8b7a46fef3f574e5d1543e717e0de177b312e62ddfdd638cc0456d1d02e0af0f4862f2a886dd941a5d2c1ca00344a4c7a758d3ebec1a42914386c89ee

  • SSDEEP

    768:qGHV45EDE477AZbUJx0rZGE3jCELoiMMj6hZ3nE+EXVmkDbjRL8Khc15Z6J1Sl:qG14P477AxUYrZGoC09k0SkTRHhWqPA

Malware Config

Targets

    • Target

      1fc71ef97d0185e6db2931bd4974581e283f08ec3356a5dd30f0de9c4f3862a7

    • Size

      73KB

    • MD5

      b03ea6a2e0258d400b11472beca2152f

    • SHA1

      ac1442017b007f82f739fb7b67451b795a95a90e

    • SHA256

      1fc71ef97d0185e6db2931bd4974581e283f08ec3356a5dd30f0de9c4f3862a7

    • SHA512

      1df38aa8b7a46fef3f574e5d1543e717e0de177b312e62ddfdd638cc0456d1d02e0af0f4862f2a886dd941a5d2c1ca00344a4c7a758d3ebec1a42914386c89ee

    • SSDEEP

      768:qGHV45EDE477AZbUJx0rZGE3jCELoiMMj6hZ3nE+EXVmkDbjRL8Khc15Z6J1Sl:qG14P477AxUYrZGoC09k0SkTRHhWqPA

    • Detects executables containing base64 encoded User Agent

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks