General

  • Target

    2c0a7845e205c33877a2a8aa3c5c337e363d32dfb2c7d0cfe25d45d6eb968cc0

  • Size

    405KB

  • Sample

    240602-haz5psdh3t

  • MD5

    287ed4351dbf6a7d849beea9f7787b09

  • SHA1

    bd8b644b1aad4c2b6833b3078f3cba09e27bca5b

  • SHA256

    2c0a7845e205c33877a2a8aa3c5c337e363d32dfb2c7d0cfe25d45d6eb968cc0

  • SHA512

    0a846a121ba7f7b24507f7844fb22c401ffea1a268ecf81fa8e351a066c3261cc2c4627c46f6d450068f2a92d9c5f65f7308d4198d1daf52c5f3eda61a78259c

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

Malware Config

Targets

    • Target

      2c0a7845e205c33877a2a8aa3c5c337e363d32dfb2c7d0cfe25d45d6eb968cc0

    • Size

      405KB

    • MD5

      287ed4351dbf6a7d849beea9f7787b09

    • SHA1

      bd8b644b1aad4c2b6833b3078f3cba09e27bca5b

    • SHA256

      2c0a7845e205c33877a2a8aa3c5c337e363d32dfb2c7d0cfe25d45d6eb968cc0

    • SHA512

      0a846a121ba7f7b24507f7844fb22c401ffea1a268ecf81fa8e351a066c3261cc2c4627c46f6d450068f2a92d9c5f65f7308d4198d1daf52c5f3eda61a78259c

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4:gtRfJcNYFNm8UhlZGse

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks