General

  • Target

    ae20f345f9a5903c752fd03818286e5dd0a34b7cc4b631c0ed21cdd3e33060a8

  • Size

    400KB

  • Sample

    240613-a2zz1s1emn

  • MD5

    53e7ffe8c377b152bd261d47746e456f

  • SHA1

    da4d5863963ab4eb97fe97f091700aa4da1c2e53

  • SHA256

    ae20f345f9a5903c752fd03818286e5dd0a34b7cc4b631c0ed21cdd3e33060a8

  • SHA512

    f9d946eaa62528a5c8b9e77f488ac61b0ac5a2bc9148c0c792a8ef9333041d29f6d9ceb3d7e23552f9b21919cc571904b6b6f7f2e66581015561bdcf5ddda531

  • SSDEEP

    6144:e+aezsP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1moW:e+aQahVy41

Score
7/10

Malware Config

Targets

    • Target

      ae20f345f9a5903c752fd03818286e5dd0a34b7cc4b631c0ed21cdd3e33060a8

    • Size

      400KB

    • MD5

      53e7ffe8c377b152bd261d47746e456f

    • SHA1

      da4d5863963ab4eb97fe97f091700aa4da1c2e53

    • SHA256

      ae20f345f9a5903c752fd03818286e5dd0a34b7cc4b631c0ed21cdd3e33060a8

    • SHA512

      f9d946eaa62528a5c8b9e77f488ac61b0ac5a2bc9148c0c792a8ef9333041d29f6d9ceb3d7e23552f9b21919cc571904b6b6f7f2e66581015561bdcf5ddda531

    • SSDEEP

      6144:e+aezsP2zPVz7jUBs8hqcBCi6dbfra4erJlt9A+xX1oOAisEIWmGeNkfGuYF1moW:e+aQahVy41

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks