General

  • Target

    VirusShare_02d8757eea9192313f9d5888a5bc1bc1

  • Size

    12KB

  • Sample

    240610-ycql2sycpl

  • MD5

    02d8757eea9192313f9d5888a5bc1bc1

  • SHA1

    a34044e9316c5d691cd73dd699210b3f10832fe0

  • SHA256

    fc3bc3a24aaf95cb44ab5e9b8f8b9da0bdcbab344047696efabc15cf666cb03d

  • SHA512

    d75b96a71f361180c03560d03771e341239f745b796830afc21bdde498994f75f1ddf3d206b00e43f1733e8edd7b97e8e0dfea2d119d0cc5528608972cad9eda

  • SSDEEP

    192:y/TrG62a6B10k3g4fXk1iTV3HGc7EkpAqEjvu2q9C/YpXnAITZfPtRM0ICU:yebFNw4Pk1itKkpAjjI2Ypdm0nU

Malware Config

Targets

    • Target

      VirusShare_02d8757eea9192313f9d5888a5bc1bc1

    • Size

      12KB

    • MD5

      02d8757eea9192313f9d5888a5bc1bc1

    • SHA1

      a34044e9316c5d691cd73dd699210b3f10832fe0

    • SHA256

      fc3bc3a24aaf95cb44ab5e9b8f8b9da0bdcbab344047696efabc15cf666cb03d

    • SHA512

      d75b96a71f361180c03560d03771e341239f745b796830afc21bdde498994f75f1ddf3d206b00e43f1733e8edd7b97e8e0dfea2d119d0cc5528608972cad9eda

    • SSDEEP

      192:y/TrG62a6B10k3g4fXk1iTV3HGc7EkpAqEjvu2q9C/YpXnAITZfPtRM0ICU:yebFNw4Pk1itKkpAjjI2Ypdm0nU

    • Drops file in Drivers directory

    • Drops startup file

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks