General

  • Target

    1f4bca4e2e4a44b08e68610446f5b86931ec4e74a0111a6f434f21d8c9766f27

  • Size

    81KB

  • Sample

    240613-a22tls1enj

  • MD5

    f906d4f89605e70b341ffdddd3b7846d

  • SHA1

    8432e5cdc10dae6cf74e59df710369cc247a7d74

  • SHA256

    1f4bca4e2e4a44b08e68610446f5b86931ec4e74a0111a6f434f21d8c9766f27

  • SHA512

    396a3ff4773f3da6be8ed53a879de6e14d7080ab39e6b1f996e195922e6a6b08cc15728ca651bd51e6bcffbc1be4bd1ee9336292ae15262f0b2665e744a3ff29

  • SSDEEP

    1536:HHe+Zk7qzUJBeLkbiT29dXWEToa9D4ZQKbgZi1dst7x9PxQ:HHe+aezUDbHXKlZQKbgZi1St7xQ

Score
7/10

Malware Config

Targets

    • Target

      1f4bca4e2e4a44b08e68610446f5b86931ec4e74a0111a6f434f21d8c9766f27

    • Size

      81KB

    • MD5

      f906d4f89605e70b341ffdddd3b7846d

    • SHA1

      8432e5cdc10dae6cf74e59df710369cc247a7d74

    • SHA256

      1f4bca4e2e4a44b08e68610446f5b86931ec4e74a0111a6f434f21d8c9766f27

    • SHA512

      396a3ff4773f3da6be8ed53a879de6e14d7080ab39e6b1f996e195922e6a6b08cc15728ca651bd51e6bcffbc1be4bd1ee9336292ae15262f0b2665e744a3ff29

    • SSDEEP

      1536:HHe+Zk7qzUJBeLkbiT29dXWEToa9D4ZQKbgZi1dst7x9PxQ:HHe+aezUDbHXKlZQKbgZi1St7xQ

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks