General

  • Target

    c43c333e5caa6db50059203a8056b36f9bbafe829be60c07cf1f84e425c25fdb

  • Size

    963KB

  • Sample

    240725-lv7basvbrb

  • MD5

    9f6568df9df5cde5ecaac81c36afb291

  • SHA1

    e6d21d558e7b46d19bad965685d962cfb77bd760

  • SHA256

    c43c333e5caa6db50059203a8056b36f9bbafe829be60c07cf1f84e425c25fdb

  • SHA512

    3a72c44e89c5afc3dd416c95a87f7a33befb5b13fa9cb422404a1a9c8179fd2effac64b51e9eac61192af9fcbec0d7e31068c47c735155ff0fe1987b3fc518cf

  • SSDEEP

    12288:8RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:BBpDRmi78gkPXlyo0G/jr

Malware Config

Targets

    • Target

      c43c333e5caa6db50059203a8056b36f9bbafe829be60c07cf1f84e425c25fdb

    • Size

      963KB

    • MD5

      9f6568df9df5cde5ecaac81c36afb291

    • SHA1

      e6d21d558e7b46d19bad965685d962cfb77bd760

    • SHA256

      c43c333e5caa6db50059203a8056b36f9bbafe829be60c07cf1f84e425c25fdb

    • SHA512

      3a72c44e89c5afc3dd416c95a87f7a33befb5b13fa9cb422404a1a9c8179fd2effac64b51e9eac61192af9fcbec0d7e31068c47c735155ff0fe1987b3fc518cf

    • SSDEEP

      12288:8RKcv8Nh7py6Rmi78gkPH3aPI9vyVg/0paQuj3IdD02fKBjtp/:BBpDRmi78gkPXlyo0G/jr

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks