General

  • Target

    7cc6ad678c9fc34408d1cc339a28db77300197f1c364d7527569e892aa4a43f5

  • Size

    311KB

  • Sample

    240726-3q7vpssdnm

  • MD5

    cdc3d8f3f874a232a02ab019902bae4f

  • SHA1

    f9a71e1a7d001fb9dc2bbff37728fcad58e2d4bd

  • SHA256

    7cc6ad678c9fc34408d1cc339a28db77300197f1c364d7527569e892aa4a43f5

  • SHA512

    08a21217437c0cdb75a31ed4b942c5da1be31915bfecab00e34dfea3a40aeca4d462c21546595971f8514da59ab670d57c604f79a78a0c9ff54aeecfbc3ad3ac

  • SSDEEP

    6144:NQZXVRBpE3hetT5tBTyTmYokr12Hd1x2Ezp87G9Aen7u91zjTTy:EVRTE3het1yJh2HduH7GqjTy

Malware Config

Targets

    • Target

      7cc6ad678c9fc34408d1cc339a28db77300197f1c364d7527569e892aa4a43f5

    • Size

      311KB

    • MD5

      cdc3d8f3f874a232a02ab019902bae4f

    • SHA1

      f9a71e1a7d001fb9dc2bbff37728fcad58e2d4bd

    • SHA256

      7cc6ad678c9fc34408d1cc339a28db77300197f1c364d7527569e892aa4a43f5

    • SHA512

      08a21217437c0cdb75a31ed4b942c5da1be31915bfecab00e34dfea3a40aeca4d462c21546595971f8514da59ab670d57c604f79a78a0c9ff54aeecfbc3ad3ac

    • SSDEEP

      6144:NQZXVRBpE3hetT5tBTyTmYokr12Hd1x2Ezp87G9Aen7u91zjTTy:EVRTE3het1yJh2HduH7GqjTy

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks