General

  • Target

    e7352e75f5cda26851c48143ebf64e982b6ef366f4c7eac9dd14958d533d8e5b

  • Size

    406KB

  • Sample

    240525-byeekshh5w

  • MD5

    37919597e59ad91af5e6da3ea50fc4c6

  • SHA1

    3c6f7fbfb00042cea891569ba123d03585f7de7e

  • SHA256

    e7352e75f5cda26851c48143ebf64e982b6ef366f4c7eac9dd14958d533d8e5b

  • SHA512

    b3f9e1de24c3b9a0a527de86211a280a5df0bb2eccf9cdcec5183fb13024b38aa68ba365cb680f41c948f41cc365571ef409cfd8ecf7f2cd27c0dee82198639f

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

Malware Config

Targets

    • Target

      e7352e75f5cda26851c48143ebf64e982b6ef366f4c7eac9dd14958d533d8e5b

    • Size

      406KB

    • MD5

      37919597e59ad91af5e6da3ea50fc4c6

    • SHA1

      3c6f7fbfb00042cea891569ba123d03585f7de7e

    • SHA256

      e7352e75f5cda26851c48143ebf64e982b6ef366f4c7eac9dd14958d533d8e5b

    • SHA512

      b3f9e1de24c3b9a0a527de86211a280a5df0bb2eccf9cdcec5183fb13024b38aa68ba365cb680f41c948f41cc365571ef409cfd8ecf7f2cd27c0dee82198639f

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks