General

  • Target

    3bfe4f70173faf12dafe08bcabf4e8287caea7040a400b4abcc9cb4c833ca3ca

  • Size

    577KB

  • Sample

    240613-ecd4gatbme

  • MD5

    ba4c49b7bc2b5f6ec78dec7acc679d17

  • SHA1

    1a32f575ced41a4fd8b7ca8c987c9d1e1c00b036

  • SHA256

    3bfe4f70173faf12dafe08bcabf4e8287caea7040a400b4abcc9cb4c833ca3ca

  • SHA512

    64c6f6c05fae9ba45ba27e315ed147028e45f231c53743fb6aeea7a1089f80898ef8611ada983667583a1ec061237614f8b0d1726043f7f6576b264084671b9e

  • SSDEEP

    6144:IG5KQE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQG:IPr7a3iwbihym2g7XO3LWUQfh4Co

Score
7/10

Malware Config

Targets

    • Target

      3bfe4f70173faf12dafe08bcabf4e8287caea7040a400b4abcc9cb4c833ca3ca

    • Size

      577KB

    • MD5

      ba4c49b7bc2b5f6ec78dec7acc679d17

    • SHA1

      1a32f575ced41a4fd8b7ca8c987c9d1e1c00b036

    • SHA256

      3bfe4f70173faf12dafe08bcabf4e8287caea7040a400b4abcc9cb4c833ca3ca

    • SHA512

      64c6f6c05fae9ba45ba27e315ed147028e45f231c53743fb6aeea7a1089f80898ef8611ada983667583a1ec061237614f8b0d1726043f7f6576b264084671b9e

    • SSDEEP

      6144:IG5KQE7cV3iwbAFRWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BHQQG:IPr7a3iwbihym2g7XO3LWUQfh4Co

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks