General

  • Target

    2024-06-02_383bc5c17e2bf7a661387ff7b1711424_magniber

  • Size

    10.1MB

  • Sample

    240602-n1gzpsbh6y

  • MD5

    383bc5c17e2bf7a661387ff7b1711424

  • SHA1

    5259df006eb84569dd249bb04ec3385194c7db4f

  • SHA256

    bb69cf934fbce5726dec158d2ac934be1bee8dd67ace38df023c11ec7fc7f239

  • SHA512

    c67e8921391ed4d75ed55f8ec9bb59d4f29a42416eda2bb929db0e6f914290461f78ce81f71060bd28fcb99e7e543c5958913cf8e72f37d0d139bdb83c56b24c

  • SSDEEP

    196608:Vdad4T0xcsSB5orrcbSsi0s/lmPJ7N3VvXWrqufezvq:DadCoXrlAJ7N3pXW2uGzy

Malware Config

Targets

    • Target

      2024-06-02_383bc5c17e2bf7a661387ff7b1711424_magniber

    • Size

      10.1MB

    • MD5

      383bc5c17e2bf7a661387ff7b1711424

    • SHA1

      5259df006eb84569dd249bb04ec3385194c7db4f

    • SHA256

      bb69cf934fbce5726dec158d2ac934be1bee8dd67ace38df023c11ec7fc7f239

    • SHA512

      c67e8921391ed4d75ed55f8ec9bb59d4f29a42416eda2bb929db0e6f914290461f78ce81f71060bd28fcb99e7e543c5958913cf8e72f37d0d139bdb83c56b24c

    • SSDEEP

      196608:Vdad4T0xcsSB5orrcbSsi0s/lmPJ7N3VvXWrqufezvq:DadCoXrlAJ7N3pXW2uGzy

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Blocklisted process makes network request

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks