General

  • Target

    de8c9a16ca6d4629aefaa4e82531812199a31c463b77ca0beb6f06e0f9b5c59c

  • Size

    673KB

  • Sample

    240613-a2wbts1elr

  • MD5

    109e02d679e0ab4971458b54e4a71b7b

  • SHA1

    03ce21bb9854783587bec8f74d616156d69ef6ed

  • SHA256

    de8c9a16ca6d4629aefaa4e82531812199a31c463b77ca0beb6f06e0f9b5c59c

  • SHA512

    08bcfcdac0ccf8ce12c805f24b2b79c553c82b9c40dc13599c5565ad1c1ffa2192e0e0b9fea512e2e9bb50ef4c7659ef813144e35fb2a2e35bda02964dd8c572

  • SSDEEP

    6144:e+aez/C9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKFVAh:e+arPFlTz

Score
7/10

Malware Config

Targets

    • Target

      de8c9a16ca6d4629aefaa4e82531812199a31c463b77ca0beb6f06e0f9b5c59c

    • Size

      673KB

    • MD5

      109e02d679e0ab4971458b54e4a71b7b

    • SHA1

      03ce21bb9854783587bec8f74d616156d69ef6ed

    • SHA256

      de8c9a16ca6d4629aefaa4e82531812199a31c463b77ca0beb6f06e0f9b5c59c

    • SHA512

      08bcfcdac0ccf8ce12c805f24b2b79c553c82b9c40dc13599c5565ad1c1ffa2192e0e0b9fea512e2e9bb50ef4c7659ef813144e35fb2a2e35bda02964dd8c572

    • SSDEEP

      6144:e+aez/C9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKFVAh:e+arPFlTz

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks