General

  • Target

    7fc6a87341b828a44a3b0a1e77c941910567ecd42455540280f444cbcd953684

  • Size

    264KB

  • Sample

    240708-qdgfrssgnf

  • MD5

    269a181af72cddaee9dc327aa18b1b94

  • SHA1

    45f472e44ee815075620e8d24c5cd1b98dcba645

  • SHA256

    7fc6a87341b828a44a3b0a1e77c941910567ecd42455540280f444cbcd953684

  • SHA512

    ec17494ac9f7047db4b121f347d9613dbb121ff3ef9b5ed3db2d5f447747e3f1eda59f5399c7bf5174abb364d412fc981371b34d03f32c50574f52047f224c95

  • SSDEEP

    3072:eqfZQioJK+LRkgUA1nQZwFGVO4Mqg+WDY:RALRp1nQ4QLd

Score
7/10

Malware Config

Targets

    • Target

      7fc6a87341b828a44a3b0a1e77c941910567ecd42455540280f444cbcd953684

    • Size

      264KB

    • MD5

      269a181af72cddaee9dc327aa18b1b94

    • SHA1

      45f472e44ee815075620e8d24c5cd1b98dcba645

    • SHA256

      7fc6a87341b828a44a3b0a1e77c941910567ecd42455540280f444cbcd953684

    • SHA512

      ec17494ac9f7047db4b121f347d9613dbb121ff3ef9b5ed3db2d5f447747e3f1eda59f5399c7bf5174abb364d412fc981371b34d03f32c50574f52047f224c95

    • SSDEEP

      3072:eqfZQioJK+LRkgUA1nQZwFGVO4Mqg+WDY:RALRp1nQ4QLd

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks