General

  • Target

    8c8bdd6f8fc7d140cc3910e3c41a413322f9bbfa4f84b86dd45017b99f543dc0

  • Size

    130KB

  • Sample

    240601-apcc7abf78

  • MD5

    2841fe267fe71f9622008a453981f137

  • SHA1

    c6c53dbac47997ecd7eef531e1860da3e52b731c

  • SHA256

    8c8bdd6f8fc7d140cc3910e3c41a413322f9bbfa4f84b86dd45017b99f543dc0

  • SHA512

    b4d20088752159b4f696cf9ac7df19da172035f44ba77afc8cd3f2e890dfd26e815aef7a5b07d3c5969f06c174cbb3954ee6cdd21b1069dc6b8e1da8fb7cfec9

  • SSDEEP

    3072:/V2A/gVh74gpg8kSqHyn10R40E2af9f+wh5Qh1n2XT:/MAoVNUbaS43Xf9fADST

Malware Config

Targets

    • Target

      8c8bdd6f8fc7d140cc3910e3c41a413322f9bbfa4f84b86dd45017b99f543dc0

    • Size

      130KB

    • MD5

      2841fe267fe71f9622008a453981f137

    • SHA1

      c6c53dbac47997ecd7eef531e1860da3e52b731c

    • SHA256

      8c8bdd6f8fc7d140cc3910e3c41a413322f9bbfa4f84b86dd45017b99f543dc0

    • SHA512

      b4d20088752159b4f696cf9ac7df19da172035f44ba77afc8cd3f2e890dfd26e815aef7a5b07d3c5969f06c174cbb3954ee6cdd21b1069dc6b8e1da8fb7cfec9

    • SSDEEP

      3072:/V2A/gVh74gpg8kSqHyn10R40E2af9f+wh5Qh1n2XT:/MAoVNUbaS43Xf9fADST

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks