General

  • Target

    aed804ed0f7d029146dba87db410259242cdf5349280adb53e5288bb7870119e

  • Size

    321KB

  • Sample

    240527-sml4qage7y

  • MD5

    ab1ee6d132843e499a9777b2052d5e56

  • SHA1

    0f5f5ade9cf7c27372e8d5a0fe0e56b4cfc47c28

  • SHA256

    aed804ed0f7d029146dba87db410259242cdf5349280adb53e5288bb7870119e

  • SHA512

    200d26b96e702ae654a01d201962352d5fa126a4fcdff6cc41ab900f56b2a039677bc205b5d822d2c7e13168c5cddf5db41ee4996be96acb339bebb0d9513f92

  • SSDEEP

    1536:FITncx1aeg1vye1MRSO9aJfXgY1zUTyr5hVM:FWf9qe1ISO+XgTTSje

Score
7/10

Malware Config

Targets

    • Target

      aed804ed0f7d029146dba87db410259242cdf5349280adb53e5288bb7870119e

    • Size

      321KB

    • MD5

      ab1ee6d132843e499a9777b2052d5e56

    • SHA1

      0f5f5ade9cf7c27372e8d5a0fe0e56b4cfc47c28

    • SHA256

      aed804ed0f7d029146dba87db410259242cdf5349280adb53e5288bb7870119e

    • SHA512

      200d26b96e702ae654a01d201962352d5fa126a4fcdff6cc41ab900f56b2a039677bc205b5d822d2c7e13168c5cddf5db41ee4996be96acb339bebb0d9513f92

    • SSDEEP

      1536:FITncx1aeg1vye1MRSO9aJfXgY1zUTyr5hVM:FWf9qe1ISO+XgTTSje

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks