General

  • Target

    2a5921cf8c597eed1bbdd5e503455384e346c3d34b93325941a2d0cc9125a3fb

  • Size

    673KB

  • Sample

    240719-fsdnbaxejg

  • MD5

    241bea04dd04559c2b7cfc517540e37c

  • SHA1

    2931e2c804e105156cca481c971d1dbe1eca442b

  • SHA256

    2a5921cf8c597eed1bbdd5e503455384e346c3d34b93325941a2d0cc9125a3fb

  • SHA512

    fc859f44b4acea75ee8978eb3f7c6b6cb6aca0da1d109dd716416b81b0c4dad11ccbd3575e14d5ae103abfe96bd304793f9dc58893667e769c76772e9f4b829c

  • SSDEEP

    6144:Mb+aez/C9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKFVg:Mb+arPFlTz

Score
7/10

Malware Config

Targets

    • Target

      2a5921cf8c597eed1bbdd5e503455384e346c3d34b93325941a2d0cc9125a3fb

    • Size

      673KB

    • MD5

      241bea04dd04559c2b7cfc517540e37c

    • SHA1

      2931e2c804e105156cca481c971d1dbe1eca442b

    • SHA256

      2a5921cf8c597eed1bbdd5e503455384e346c3d34b93325941a2d0cc9125a3fb

    • SHA512

      fc859f44b4acea75ee8978eb3f7c6b6cb6aca0da1d109dd716416b81b0c4dad11ccbd3575e14d5ae103abfe96bd304793f9dc58893667e769c76772e9f4b829c

    • SSDEEP

      6144:Mb+aez/C9LRU0ySj14WH+JPb7uL8zRMnJjNhAp7SO8zRMnJjNhAp7S8FRcdEKFVg:Mb+arPFlTz

    Score
    7/10
    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks