General

  • Target

    c10bc7e2804fab288c8b50034bdf46167e29141bf2b4c29d9114b3b7bb9c6704

  • Size

    27KB

  • Sample

    240609-ketvlagh48

  • MD5

    0293ea32ef072af2e3b0c45d5c5b431c

  • SHA1

    84c46aa78572dfd266f010ad3f5adf660c6e93a4

  • SHA256

    c10bc7e2804fab288c8b50034bdf46167e29141bf2b4c29d9114b3b7bb9c6704

  • SHA512

    1e35b1c5472d5c378137706eeda7c10b85123d047ad7cd6817c758146b3d5d61f2262bff4c2023b16ccf879e7946e254aa36fa70b6573c7ac78c30408d6d2fd7

  • SSDEEP

    768:X9J/3FzjgfanEGx8V36unjv88tznuRU65Y4gpph1ePVCM6:N5VzcfA/6LrVpL74gfh16n6

Malware Config

Targets

    • Target

      c10bc7e2804fab288c8b50034bdf46167e29141bf2b4c29d9114b3b7bb9c6704

    • Size

      27KB

    • MD5

      0293ea32ef072af2e3b0c45d5c5b431c

    • SHA1

      84c46aa78572dfd266f010ad3f5adf660c6e93a4

    • SHA256

      c10bc7e2804fab288c8b50034bdf46167e29141bf2b4c29d9114b3b7bb9c6704

    • SHA512

      1e35b1c5472d5c378137706eeda7c10b85123d047ad7cd6817c758146b3d5d61f2262bff4c2023b16ccf879e7946e254aa36fa70b6573c7ac78c30408d6d2fd7

    • SSDEEP

      768:X9J/3FzjgfanEGx8V36unjv88tznuRU65Y4gpph1ePVCM6:N5VzcfA/6LrVpL74gfh16n6

    • UPX dump on OEP (original entry point)

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks