General

  • Target

    318bb39b52fa00c701fcf0f5866035f2e685e990cdfaa060c7ba6457c68b5243

  • Size

    4.3MB

  • Sample

    240521-zh2f6shh7t

  • MD5

    3695f579032cf2a5918945179ed2fd08

  • SHA1

    cd728e8632439fbdec5a9d6a6c5ec5faaeb50073

  • SHA256

    318bb39b52fa00c701fcf0f5866035f2e685e990cdfaa060c7ba6457c68b5243

  • SHA512

    a6231b8645f5fd1792301753449243c964df85fc60a029a7e9f177b87f6e8b4e69d627409ea62a2b327dd0acc683c4c17e26222952900c6f674a98b8dbfc9c35

  • SSDEEP

    98304:yCXlthlslLCXlthlsls12YOXwnS4rVzqbM7Iw:PlthlslUlthlsls1XI8qb

Malware Config

Targets

    • Target

      318bb39b52fa00c701fcf0f5866035f2e685e990cdfaa060c7ba6457c68b5243

    • Size

      4.3MB

    • MD5

      3695f579032cf2a5918945179ed2fd08

    • SHA1

      cd728e8632439fbdec5a9d6a6c5ec5faaeb50073

    • SHA256

      318bb39b52fa00c701fcf0f5866035f2e685e990cdfaa060c7ba6457c68b5243

    • SHA512

      a6231b8645f5fd1792301753449243c964df85fc60a029a7e9f177b87f6e8b4e69d627409ea62a2b327dd0acc683c4c17e26222952900c6f674a98b8dbfc9c35

    • SSDEEP

      98304:yCXlthlslLCXlthlsls12YOXwnS4rVzqbM7Iw:PlthlslUlthlsls1XI8qb

    • UPX dump on OEP (original entry point)

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks