General

  • Target

    b46a9547e85ca601ce8d086ce05bc1257d08657c168a3308dd65cd67f394e7dd

  • Size

    17KB

  • Sample

    240613-d9s38awhkm

  • MD5

    9db901584e191fcb4d4748e1f60cfca9

  • SHA1

    e8a120a1204e1e9bec26ccb17846e603af7a32dd

  • SHA256

    b46a9547e85ca601ce8d086ce05bc1257d08657c168a3308dd65cd67f394e7dd

  • SHA512

    dc86ac2e6047107623b038d243612df81e83250a10d92c9c70076e1929e0a28bd76d330ba0c87d0addeb049264ebe0088c284c2516a5e7fe0a962652a9de0a4c

  • SSDEEP

    384:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/Lwg:IMAQ+BzWPEwnE+KHM2/Lwg

Malware Config

Targets

    • Target

      b46a9547e85ca601ce8d086ce05bc1257d08657c168a3308dd65cd67f394e7dd

    • Size

      17KB

    • MD5

      9db901584e191fcb4d4748e1f60cfca9

    • SHA1

      e8a120a1204e1e9bec26ccb17846e603af7a32dd

    • SHA256

      b46a9547e85ca601ce8d086ce05bc1257d08657c168a3308dd65cd67f394e7dd

    • SHA512

      dc86ac2e6047107623b038d243612df81e83250a10d92c9c70076e1929e0a28bd76d330ba0c87d0addeb049264ebe0088c284c2516a5e7fe0a962652a9de0a4c

    • SSDEEP

      384:x+uPfoQ+DfYMzKdPEsOuubuEG3KHM2/Lwg:IMAQ+BzWPEwnE+KHM2/Lwg

    • Executes dropped EXE

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks