General

  • Target

    61d76a2ebdfbb7b3b1dfad011fb9428f0c803b0628a5ae28b2f5cea15a1bda95

  • Size

    970KB

  • Sample

    240613-a2yrysxenb

  • MD5

    36ae941462e070eacf0ac48986d6bab3

  • SHA1

    5e2638f73df51b9e180219ef1be11f3c9d5f6d30

  • SHA256

    61d76a2ebdfbb7b3b1dfad011fb9428f0c803b0628a5ae28b2f5cea15a1bda95

  • SHA512

    a55fc0864ef85d89cca4d727f992346dff03590407bb55b5286ac3b1e81ca1cb2e9551c9cce12203041a25e18f6ef32f5ff8a4d41e424eecd4628f21342d0461

  • SSDEEP

    12288:e+aIRKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:eB9BpDRmi78gkPXlyo0G/jr

Score
7/10

Malware Config

Targets

    • Target

      61d76a2ebdfbb7b3b1dfad011fb9428f0c803b0628a5ae28b2f5cea15a1bda95

    • Size

      970KB

    • MD5

      36ae941462e070eacf0ac48986d6bab3

    • SHA1

      5e2638f73df51b9e180219ef1be11f3c9d5f6d30

    • SHA256

      61d76a2ebdfbb7b3b1dfad011fb9428f0c803b0628a5ae28b2f5cea15a1bda95

    • SHA512

      a55fc0864ef85d89cca4d727f992346dff03590407bb55b5286ac3b1e81ca1cb2e9551c9cce12203041a25e18f6ef32f5ff8a4d41e424eecd4628f21342d0461

    • SSDEEP

      12288:e+aIRKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:eB9BpDRmi78gkPXlyo0G/jr

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks