General

  • Target

    f60e20fb44ad0d735d10feb95ee9736672cdcc011ab7184d709a0f1e8fdb16ef

  • Size

    164KB

  • Sample

    240723-2zrdmsxara

  • MD5

    286df2157c22ca4703c7b110cd63187e

  • SHA1

    5cdf9f03fe3ba20f286a49538857c27eba2bb160

  • SHA256

    f60e20fb44ad0d735d10feb95ee9736672cdcc011ab7184d709a0f1e8fdb16ef

  • SHA512

    8da63fdb9aa120c9f84010d639cdd428d71d52391a1c292dcc87cf907989ac196c3bed23eab15f651ad21fc2fe9ff4a0fd1ffd1a2545b691e086983e354f6df7

  • SSDEEP

    3072:eZfZQioJKZ99djmMGWBgh1002J8emEu3T7TO+9Z9sTOVrZzxVxU:i5YWBW1Wu3rOOuOVr8

Malware Config

Targets

    • Target

      f60e20fb44ad0d735d10feb95ee9736672cdcc011ab7184d709a0f1e8fdb16ef

    • Size

      164KB

    • MD5

      286df2157c22ca4703c7b110cd63187e

    • SHA1

      5cdf9f03fe3ba20f286a49538857c27eba2bb160

    • SHA256

      f60e20fb44ad0d735d10feb95ee9736672cdcc011ab7184d709a0f1e8fdb16ef

    • SHA512

      8da63fdb9aa120c9f84010d639cdd428d71d52391a1c292dcc87cf907989ac196c3bed23eab15f651ad21fc2fe9ff4a0fd1ffd1a2545b691e086983e354f6df7

    • SSDEEP

      3072:eZfZQioJKZ99djmMGWBgh1002J8emEu3T7TO+9Z9sTOVrZzxVxU:i5YWBW1Wu3rOOuOVr8

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks