General

  • Target

    10f1e8bb2995bbd3c02b86ae50836d90f1fe7d05b78851fb2c3881de9915a5f2

  • Size

    5.7MB

  • Sample

    240712-v6jttatbpq

  • MD5

    08bbfb48d27a148527540d64ec91be5c

  • SHA1

    1a3e34680b0d6ff980e58a54f687b061f9afc939

  • SHA256

    10f1e8bb2995bbd3c02b86ae50836d90f1fe7d05b78851fb2c3881de9915a5f2

  • SHA512

    b00a729c42a1fc3b8e8f397d56f1e46d81b231bc6e2f24d8bf54b8cafd64ea31d8ea41a22df57d67a8d3e6fb8cf0d8c26de3235c7aaffddf74bfd458f1817084

  • SSDEEP

    49152:wKPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPn:wsKUgTH2M2m9UMpu1QfLczqssnKSk

Score
8/10

Malware Config

Targets

    • Target

      10f1e8bb2995bbd3c02b86ae50836d90f1fe7d05b78851fb2c3881de9915a5f2

    • Size

      5.7MB

    • MD5

      08bbfb48d27a148527540d64ec91be5c

    • SHA1

      1a3e34680b0d6ff980e58a54f687b061f9afc939

    • SHA256

      10f1e8bb2995bbd3c02b86ae50836d90f1fe7d05b78851fb2c3881de9915a5f2

    • SHA512

      b00a729c42a1fc3b8e8f397d56f1e46d81b231bc6e2f24d8bf54b8cafd64ea31d8ea41a22df57d67a8d3e6fb8cf0d8c26de3235c7aaffddf74bfd458f1817084

    • SSDEEP

      49152:wKPv94AEsKU8ggw1g+1CART5eBiyKS3EI3wybn20DCYIHvc8ixuZm9+fWsw6dTPn:wsKUgTH2M2m9UMpu1QfLczqssnKSk

    Score
    8/10
    • Drops file in Drivers directory

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks