General

  • Target

    30e0003782add6df40a66d4906518b550148e394e1178c4297d3ca848dbc9df7

  • Size

    405KB

  • Sample

    240525-e6grfsef62

  • MD5

    f35b1a9801abd3a64bbd1c8aa8c77a00

  • SHA1

    3191a59fa69b558351d2437fee586477cfe9e6ca

  • SHA256

    30e0003782add6df40a66d4906518b550148e394e1178c4297d3ca848dbc9df7

  • SHA512

    c46a8612572a6cbaaa9151c2571e9e67e710c85f8d287cb8e3afc8717af241e3121a2f2677cbc03b88df19c588a346fcb3d5745427ec6d7fe6140889e749b25e

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

Malware Config

Targets

    • Target

      30e0003782add6df40a66d4906518b550148e394e1178c4297d3ca848dbc9df7

    • Size

      405KB

    • MD5

      f35b1a9801abd3a64bbd1c8aa8c77a00

    • SHA1

      3191a59fa69b558351d2437fee586477cfe9e6ca

    • SHA256

      30e0003782add6df40a66d4906518b550148e394e1178c4297d3ca848dbc9df7

    • SHA512

      c46a8612572a6cbaaa9151c2571e9e67e710c85f8d287cb8e3afc8717af241e3121a2f2677cbc03b88df19c588a346fcb3d5745427ec6d7fe6140889e749b25e

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks