General

  • Target

    5aeee509761fb33016daca1c2a9de1c41e890122266d1ec4f8349887c8d9399a

  • Size

    236KB

  • Sample

    240703-r2wq2atbqb

  • MD5

    40bb2421f47b77f56548ad05fb5ef588

  • SHA1

    3776cc8884493f70df8f3a4b27da4146b1b8f298

  • SHA256

    5aeee509761fb33016daca1c2a9de1c41e890122266d1ec4f8349887c8d9399a

  • SHA512

    68609c021c4db76bc615e9303a73bc9fc6b730a8f97231e84c44e8873da5cbca82abc366ea146a481e9b8a7deb4a0873b974bfc23ad2f2bdb535f79ea7efcf30

  • SSDEEP

    3072:2AaY46tGNttyeQLYm16pVOqhtWAGYWOvTE4BwSfGuLG8NoqJEPyXK/aWbJSP5xVL:j46tGdye416z4KUuS8oqJIgKGe

Score
8/10

Malware Config

Targets

    • Target

      5aeee509761fb33016daca1c2a9de1c41e890122266d1ec4f8349887c8d9399a

    • Size

      236KB

    • MD5

      40bb2421f47b77f56548ad05fb5ef588

    • SHA1

      3776cc8884493f70df8f3a4b27da4146b1b8f298

    • SHA256

      5aeee509761fb33016daca1c2a9de1c41e890122266d1ec4f8349887c8d9399a

    • SHA512

      68609c021c4db76bc615e9303a73bc9fc6b730a8f97231e84c44e8873da5cbca82abc366ea146a481e9b8a7deb4a0873b974bfc23ad2f2bdb535f79ea7efcf30

    • SSDEEP

      3072:2AaY46tGNttyeQLYm16pVOqhtWAGYWOvTE4BwSfGuLG8NoqJEPyXK/aWbJSP5xVL:j46tGdye416z4KUuS8oqJIgKGe

    Score
    8/10
    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks