General

  • Target

    934dd6cd9571839de7c40a6d26881b56759bd1267a5f4baab39e47f42c8c8206

  • Size

    971KB

  • Sample

    240616-lyeepasfrl

  • MD5

    9f727f8074ee96ebafec98ce52ce9686

  • SHA1

    24eb44b7df3b0feed72667dfca25ec2d754de591

  • SHA256

    934dd6cd9571839de7c40a6d26881b56759bd1267a5f4baab39e47f42c8c8206

  • SHA512

    dcf4158d16fd82f1a9e176e45f5907cc3770abe0911fed9dfc39ef097ffba80eae3f76b29079633c6799f8a10053eb7a57d81c231b65b0bea41bcbfa41532682

  • SSDEEP

    12288:FQoNdlQfjQfRti8d1+2efpThJ/V8XIB5Opg+DBxRhNGZmK:Fr3ufph4XID2RK

Malware Config

Targets

    • Target

      934dd6cd9571839de7c40a6d26881b56759bd1267a5f4baab39e47f42c8c8206

    • Size

      971KB

    • MD5

      9f727f8074ee96ebafec98ce52ce9686

    • SHA1

      24eb44b7df3b0feed72667dfca25ec2d754de591

    • SHA256

      934dd6cd9571839de7c40a6d26881b56759bd1267a5f4baab39e47f42c8c8206

    • SHA512

      dcf4158d16fd82f1a9e176e45f5907cc3770abe0911fed9dfc39ef097ffba80eae3f76b29079633c6799f8a10053eb7a57d81c231b65b0bea41bcbfa41532682

    • SSDEEP

      12288:FQoNdlQfjQfRti8d1+2efpThJ/V8XIB5Opg+DBxRhNGZmK:Fr3ufph4XID2RK

    • .NET Reactor proctector

      Detects an executable protected by an unregistered version of Eziriz's .NET Reactor.

    • Reads WinSCP keys stored on the system

      Tries to access WinSCP stored sessions.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses Microsoft Outlook profiles

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks