General

  • Target

    71265d832deb11a12096227ea20cdea8939d75e3c8b1d397f7bcb8c68711c4c9

  • Size

    404KB

  • Sample

    240525-gay2zaga95

  • MD5

    03efb5e06538afb237157a7d89dd2045

  • SHA1

    76520c64f03eac02807e142914e373ebec6cec88

  • SHA256

    71265d832deb11a12096227ea20cdea8939d75e3c8b1d397f7bcb8c68711c4c9

  • SHA512

    eb76ea23f500c02447221439b64ab132b7935205cde9e935b4ff30d32f2e1c20248d6cc1740acde38823313cebabaf728b0ca27388dc9cc675eb759e3545ded1

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4j:gtRfJcNYFNm8UhlZGsej

Malware Config

Targets

    • Target

      71265d832deb11a12096227ea20cdea8939d75e3c8b1d397f7bcb8c68711c4c9

    • Size

      404KB

    • MD5

      03efb5e06538afb237157a7d89dd2045

    • SHA1

      76520c64f03eac02807e142914e373ebec6cec88

    • SHA256

      71265d832deb11a12096227ea20cdea8939d75e3c8b1d397f7bcb8c68711c4c9

    • SHA512

      eb76ea23f500c02447221439b64ab132b7935205cde9e935b4ff30d32f2e1c20248d6cc1740acde38823313cebabaf728b0ca27388dc9cc675eb759e3545ded1

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4j:gtRfJcNYFNm8UhlZGsej

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks