General

  • Target

    3e039882f805063fdfdd9222ec0c4bab6294e48f6aec0dab721baf88fc007ede

  • Size

    964KB

  • Sample

    240613-echfwstbmf

  • MD5

    92a3c1ad6bb9ae62bfe9dfb140339a2f

  • SHA1

    b83f8cae638ff75e97e4b088d6508b6a472b4cfa

  • SHA256

    3e039882f805063fdfdd9222ec0c4bab6294e48f6aec0dab721baf88fc007ede

  • SHA512

    ea11427fe7f00945da2f93c1e73682da93a5e5133bdcc5539665068698bd855c8ac0dbed5464db85af42faf4d5c1f661aa2fb4f20e104e196dc08d69a23b59fc

  • SSDEEP

    12288:IP2RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:IPvBpDRmi78gkPXlyo0G/jr

Score
7/10

Malware Config

Targets

    • Target

      3e039882f805063fdfdd9222ec0c4bab6294e48f6aec0dab721baf88fc007ede

    • Size

      964KB

    • MD5

      92a3c1ad6bb9ae62bfe9dfb140339a2f

    • SHA1

      b83f8cae638ff75e97e4b088d6508b6a472b4cfa

    • SHA256

      3e039882f805063fdfdd9222ec0c4bab6294e48f6aec0dab721baf88fc007ede

    • SHA512

      ea11427fe7f00945da2f93c1e73682da93a5e5133bdcc5539665068698bd855c8ac0dbed5464db85af42faf4d5c1f661aa2fb4f20e104e196dc08d69a23b59fc

    • SSDEEP

      12288:IP2RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:IPvBpDRmi78gkPXlyo0G/jr

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks