General

  • Target

    d78b97f115892e70bc7b436b704c362067ff0ed6cbb26f8dfe7f9de748ffcb29

  • Size

    369KB

  • Sample

    240522-y471eafb3t

  • MD5

    eea729c312c6e2ebea7ada18bf57e849

  • SHA1

    fa1e2bad8b3ca2a7994a73f9b4f584d2401d85d3

  • SHA256

    d78b97f115892e70bc7b436b704c362067ff0ed6cbb26f8dfe7f9de748ffcb29

  • SHA512

    87ea9ec6bbd31491079977a17ab373e2e6437393a3e3a0671429253283767ed81896317daa3136a4a8b0bfad27d62e98244472f566660e27371b7a4ac4580e64

  • SSDEEP

    6144:Q46tGfC0jKzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:Q3WFjyU66b5zhVymA/XSRh

Score
8/10

Malware Config

Targets

    • Target

      d78b97f115892e70bc7b436b704c362067ff0ed6cbb26f8dfe7f9de748ffcb29

    • Size

      369KB

    • MD5

      eea729c312c6e2ebea7ada18bf57e849

    • SHA1

      fa1e2bad8b3ca2a7994a73f9b4f584d2401d85d3

    • SHA256

      d78b97f115892e70bc7b436b704c362067ff0ed6cbb26f8dfe7f9de748ffcb29

    • SHA512

      87ea9ec6bbd31491079977a17ab373e2e6437393a3e3a0671429253283767ed81896317daa3136a4a8b0bfad27d62e98244472f566660e27371b7a4ac4580e64

    • SSDEEP

      6144:Q46tGfC0jKzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:Q3WFjyU66b5zhVymA/XSRh

    Score
    8/10
    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks