General

  • Target

    cc33c1b8bb5b7bf9f99027cbb6ff20e1c094bec8df386ab9772e21c8435c3b0f

  • Size

    393KB

  • Sample

    240603-f6vtraec95

  • MD5

    02abc04659cc4d18539e2f8865c9111f

  • SHA1

    b693f5ad48101d2841783ed892425ec06c6cbb51

  • SHA256

    cc33c1b8bb5b7bf9f99027cbb6ff20e1c094bec8df386ab9772e21c8435c3b0f

  • SHA512

    e10138bbf64aff52452dbb8873a84e2413f2bce5ef5f24d1137eefbea317e2e0a24a75197af5543255007854b4ee817f30512cc51e8f0d90a164ec9428bed7da

  • SSDEEP

    6144:n1qe1ISmP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1a:n1quIwahVy41

Score
7/10

Malware Config

Targets

    • Target

      cc33c1b8bb5b7bf9f99027cbb6ff20e1c094bec8df386ab9772e21c8435c3b0f

    • Size

      393KB

    • MD5

      02abc04659cc4d18539e2f8865c9111f

    • SHA1

      b693f5ad48101d2841783ed892425ec06c6cbb51

    • SHA256

      cc33c1b8bb5b7bf9f99027cbb6ff20e1c094bec8df386ab9772e21c8435c3b0f

    • SHA512

      e10138bbf64aff52452dbb8873a84e2413f2bce5ef5f24d1137eefbea317e2e0a24a75197af5543255007854b4ee817f30512cc51e8f0d90a164ec9428bed7da

    • SSDEEP

      6144:n1qe1ISmP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1a:n1quIwahVy41

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks