General

  • Target

    8a424618cfe9e24fe842ba97bd176c82070e9ecf58ff368fda1a2ccce29caab9

  • Size

    5.6MB

  • Sample

    240524-n58m8ahb31

  • MD5

    920fe71d02f71520fd8f6f54586638db

  • SHA1

    5b0c4d42c90332cf3e936ed04740206a93557b41

  • SHA256

    8a424618cfe9e24fe842ba97bd176c82070e9ecf58ff368fda1a2ccce29caab9

  • SHA512

    91402cae6e8d531e1b3bfc2053d2e24f9054d2545fa3b494e02bef1db9ba401cb913058407a8ea90e615b96de8da2273f5c635351e9a6366889be75143b39c34

  • SSDEEP

    98304:Mrbc0dxOfbCIYflBduQn8m1tB9wkakcAGbXh2Js2Uu/LKWM5Y8I:MrbcQWb8flBdm+79wEcAZaOzKWgI

Score
7/10

Malware Config

Targets

    • Target

      8a424618cfe9e24fe842ba97bd176c82070e9ecf58ff368fda1a2ccce29caab9

    • Size

      5.6MB

    • MD5

      920fe71d02f71520fd8f6f54586638db

    • SHA1

      5b0c4d42c90332cf3e936ed04740206a93557b41

    • SHA256

      8a424618cfe9e24fe842ba97bd176c82070e9ecf58ff368fda1a2ccce29caab9

    • SHA512

      91402cae6e8d531e1b3bfc2053d2e24f9054d2545fa3b494e02bef1db9ba401cb913058407a8ea90e615b96de8da2273f5c635351e9a6366889be75143b39c34

    • SSDEEP

      98304:Mrbc0dxOfbCIYflBduQn8m1tB9wkakcAGbXh2Js2Uu/LKWM5Y8I:MrbcQWb8flBdm+79wEcAZaOzKWgI

    Score
    7/10
    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks