General

  • Target

    df9c322cdd8ee5859d3cf7a9f4c2ef511f5d8580b30b3d48f82805ae37e4c40f

  • Size

    369KB

  • Sample

    240613-ec5lestbpb

  • MD5

    d2608c5d6acdb488822a98bc9c05ccb1

  • SHA1

    9bd80d75b362e22bee0d1843013a762f0cf24c4b

  • SHA256

    df9c322cdd8ee5859d3cf7a9f4c2ef511f5d8580b30b3d48f82805ae37e4c40f

  • SHA512

    fc6db7792b0d4a98c637c7e55ac55f34e670898467309bb4ec403d13c16dadbd65ededf4567c8d4d6a0d5d1c714c31e278cb11f4e718e1f2d63f2ea743f0fd7f

  • SSDEEP

    6144:IG5KOzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:IPmU66b5zhVymA/XSRh

Score
7/10

Malware Config

Targets

    • Target

      df9c322cdd8ee5859d3cf7a9f4c2ef511f5d8580b30b3d48f82805ae37e4c40f

    • Size

      369KB

    • MD5

      d2608c5d6acdb488822a98bc9c05ccb1

    • SHA1

      9bd80d75b362e22bee0d1843013a762f0cf24c4b

    • SHA256

      df9c322cdd8ee5859d3cf7a9f4c2ef511f5d8580b30b3d48f82805ae37e4c40f

    • SHA512

      fc6db7792b0d4a98c637c7e55ac55f34e670898467309bb4ec403d13c16dadbd65ededf4567c8d4d6a0d5d1c714c31e278cb11f4e718e1f2d63f2ea743f0fd7f

    • SSDEEP

      6144:IG5KOzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC:IPmU66b5zhVymA/XSRh

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks