General

  • Target

    2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047

  • Size

    70KB

  • Sample

    240523-mb6q4ach7z

  • MD5

    2b5c3664f6e4ce63bf2ad9fc0430ec37

  • SHA1

    72c7d50f70fd2ca23265c042dbefcc382693baaf

  • SHA256

    2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047

  • SHA512

    259d057c352888e6b5135b9015e940ede8911666a93224a891ee98b60c8e905b4bb6cebdb7111883dffd7e36c399b60e9d175d3c2e180e12a6ca824b243d0278

  • SSDEEP

    1536:Qh1oRJbj/e+Zk77RNCLp44x6eriw+d9bHrkT5gUHz7FxtJ:QCe+aX3t4xrBkfkT5xHzD

Score
7/10

Malware Config

Targets

    • Target

      2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047

    • Size

      70KB

    • MD5

      2b5c3664f6e4ce63bf2ad9fc0430ec37

    • SHA1

      72c7d50f70fd2ca23265c042dbefcc382693baaf

    • SHA256

      2302d4d189f215b96c37cfe141b2e3130fb63fd060a04910950cff4b1549a047

    • SHA512

      259d057c352888e6b5135b9015e940ede8911666a93224a891ee98b60c8e905b4bb6cebdb7111883dffd7e36c399b60e9d175d3c2e180e12a6ca824b243d0278

    • SSDEEP

      1536:Qh1oRJbj/e+Zk77RNCLp44x6eriw+d9bHrkT5gUHz7FxtJ:QCe+aX3t4xrBkfkT5xHzD

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks