General

  • Target

    9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55

  • Size

    491KB

  • Sample

    240603-s4a3sacd27

  • MD5

    cb599a4bede85c3b47c6bdf14ff4987a

  • SHA1

    d11ee7d1eba1b96efdb695989f891475db0d2f20

  • SHA256

    9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55

  • SHA512

    fc935711757230840596a6b7faaccd55734f2951ad5b0707bb88399ca418f624dfd912cd26325d722ecd6c2e90d1e29e1c2c20a019e9cee171414a136b6f144b

  • SSDEEP

    6144:k1NM5pOz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:k1upI1gL5pRTcAkS/3hzN8qE43fm78V

Score
7/10

Malware Config

Targets

    • Target

      9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55

    • Size

      491KB

    • MD5

      cb599a4bede85c3b47c6bdf14ff4987a

    • SHA1

      d11ee7d1eba1b96efdb695989f891475db0d2f20

    • SHA256

      9f62d23a319ab557fecf971809b9792069883c6a98bff9d0c007a0c9e1b28f55

    • SHA512

      fc935711757230840596a6b7faaccd55734f2951ad5b0707bb88399ca418f624dfd912cd26325d722ecd6c2e90d1e29e1c2c20a019e9cee171414a136b6f144b

    • SSDEEP

      6144:k1NM5pOz1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fay7:k1upI1gL5pRTcAkS/3hzN8qE43fm78V

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks