General

  • Target

    f3aa10c44399b57c262c844b7a0d928cdadeb0c22b55c9ccad00d585b4a2dd7f

  • Size

    264KB

  • Sample

    240523-mcec8sch94

  • MD5

    5daae724e89417121db4b0cddc2d55a5

  • SHA1

    e1c471f18b7cb09153344ef07754026cb34d9d0b

  • SHA256

    f3aa10c44399b57c262c844b7a0d928cdadeb0c22b55c9ccad00d585b4a2dd7f

  • SHA512

    fabfd23d2776dd89b9bc0c08940eba49e6e9fe14ec3a4122043dc9cfb072f2542d85fda998e3948ab411992f9b76fe71cb7ad069e1ba10f503acda918ca525de

  • SSDEEP

    3072:QLe+aX3t4lLRkgUA1nQZwFGVO4Mqg+WDY:/+aX3KLRp1nQ4QLd

Score
7/10

Malware Config

Targets

    • Target

      f3aa10c44399b57c262c844b7a0d928cdadeb0c22b55c9ccad00d585b4a2dd7f

    • Size

      264KB

    • MD5

      5daae724e89417121db4b0cddc2d55a5

    • SHA1

      e1c471f18b7cb09153344ef07754026cb34d9d0b

    • SHA256

      f3aa10c44399b57c262c844b7a0d928cdadeb0c22b55c9ccad00d585b4a2dd7f

    • SHA512

      fabfd23d2776dd89b9bc0c08940eba49e6e9fe14ec3a4122043dc9cfb072f2542d85fda998e3948ab411992f9b76fe71cb7ad069e1ba10f503acda918ca525de

    • SSDEEP

      3072:QLe+aX3t4lLRkgUA1nQZwFGVO4Mqg+WDY:/+aX3KLRp1nQ4QLd

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks