General

  • Target

    c1eea0c175da1a3bfb186e4985479306670a47e20329b9b42aa7483f834cf256

  • Size

    408KB

  • Sample

    240722-dbcctaxhrj

  • MD5

    ece9a0722fa8356962e6901ed61b38dc

  • SHA1

    2e39e077f365a22840d2214859a4462d5822d3f8

  • SHA256

    c1eea0c175da1a3bfb186e4985479306670a47e20329b9b42aa7483f834cf256

  • SHA512

    931db19264e5f104ea0e94b6afca158e4949af870a61a5c5fba49d0cf083448c3df4e82cdd5d378eed0cf2abca728f9b17ff64683659a4a00c105eef89036688

  • SSDEEP

    6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4U:gtRfJcNYFNm8UhlZGseU

Malware Config

Targets

    • Target

      c1eea0c175da1a3bfb186e4985479306670a47e20329b9b42aa7483f834cf256

    • Size

      408KB

    • MD5

      ece9a0722fa8356962e6901ed61b38dc

    • SHA1

      2e39e077f365a22840d2214859a4462d5822d3f8

    • SHA256

      c1eea0c175da1a3bfb186e4985479306670a47e20329b9b42aa7483f834cf256

    • SHA512

      931db19264e5f104ea0e94b6afca158e4949af870a61a5c5fba49d0cf083448c3df4e82cdd5d378eed0cf2abca728f9b17ff64683659a4a00c105eef89036688

    • SSDEEP

      6144:3w9D91dOrcN3ZGXNYFNmIkYvUIelVjjVtGRyFH4U:gtRfJcNYFNm8UhlZGseU

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks