General

  • Target

    6bcef1328c08c4e230768e985dacc9eac0e4bd4c31737f6f0bca4707a2b30088

  • Size

    56KB

  • Sample

    240725-lx8l5svdja

  • MD5

    5895215d77f4821b69b2b488688c8c9e

  • SHA1

    5cbbf497653682c996eb77eeeb15c0b799d81d93

  • SHA256

    6bcef1328c08c4e230768e985dacc9eac0e4bd4c31737f6f0bca4707a2b30088

  • SHA512

    54186b9bf8fd9118e7b2337c064858dd7cacff5b7471036c7ba8fcc54eff100bbaa89ee752681b89cc316f281fa6ddab8ca72a93a5fc2d0f81c09c32d986142f

  • SSDEEP

    768:FsPNpQFJFKZj1PVs9Ag1vzbExhU1GBRSkjirqgt6jpYU5ltbDrYiI0oPxWExI:FDcx1aeg1vye1MRSB6jWWvr78Pxc

Malware Config

Targets

    • Target

      6bcef1328c08c4e230768e985dacc9eac0e4bd4c31737f6f0bca4707a2b30088

    • Size

      56KB

    • MD5

      5895215d77f4821b69b2b488688c8c9e

    • SHA1

      5cbbf497653682c996eb77eeeb15c0b799d81d93

    • SHA256

      6bcef1328c08c4e230768e985dacc9eac0e4bd4c31737f6f0bca4707a2b30088

    • SHA512

      54186b9bf8fd9118e7b2337c064858dd7cacff5b7471036c7ba8fcc54eff100bbaa89ee752681b89cc316f281fa6ddab8ca72a93a5fc2d0f81c09c32d986142f

    • SSDEEP

      768:FsPNpQFJFKZj1PVs9Ag1vzbExhU1GBRSkjirqgt6jpYU5ltbDrYiI0oPxWExI:FDcx1aeg1vye1MRSB6jWWvr78Pxc

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks