General

  • Target

    9730e4bb1d819005e77a398c07fd3be6caa0ffa3a9fce74b067b4d55ee7a47af

  • Size

    491KB

  • Sample

    240723-scftyswbrr

  • MD5

    79bb24073280f7677ff204110d2072f6

  • SHA1

    316af2a6c9cf076aced6eb7116a463db31ab14bb

  • SHA256

    9730e4bb1d819005e77a398c07fd3be6caa0ffa3a9fce74b067b4d55ee7a47af

  • SHA512

    d93ae3cabddb1c4103a9f80a9e0abb55242091b354d17a90fb6783095758ec87bb26ae2034acd7842e86a305f6de82c2c8e5626e1575ee66f62eea0e79943fac

  • SSDEEP

    6144:o+a5z1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fayCV7E:o+ah1gL5pRTcAkS/3hzN8qE43fm78V

Malware Config

Targets

    • Target

      9730e4bb1d819005e77a398c07fd3be6caa0ffa3a9fce74b067b4d55ee7a47af

    • Size

      491KB

    • MD5

      79bb24073280f7677ff204110d2072f6

    • SHA1

      316af2a6c9cf076aced6eb7116a463db31ab14bb

    • SHA256

      9730e4bb1d819005e77a398c07fd3be6caa0ffa3a9fce74b067b4d55ee7a47af

    • SHA512

      d93ae3cabddb1c4103a9f80a9e0abb55242091b354d17a90fb6783095758ec87bb26ae2034acd7842e86a305f6de82c2c8e5626e1575ee66f62eea0e79943fac

    • SSDEEP

      6144:o+a5z1gL5pRTMTTjMkId/BynSx7dEe6XwzRaktNP08NhKs39zo43fTtl1fayCV7E:o+ah1gL5pRTcAkS/3hzN8qE43fm78V

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks