General

  • Target

    36d3b558b8756a6f264a31a5ceb1fc10N.exe

  • Size

    90KB

  • Sample

    240726-v1ja4ashlp

  • MD5

    36d3b558b8756a6f264a31a5ceb1fc10

  • SHA1

    1818f8dbc1e6b7248863c5c67990f11b6dfdf658

  • SHA256

    5a2c3c9721441a6ed8f93fcb59ee1fe8c4d2ad4f7d8935195b0ee55e14b10c64

  • SHA512

    bb13d828bfdef3963f12a8516d2fc6a6b211d08bd966377e8b9be3f658266d71077cac880ab4921b26b0246b472b3a5e3e8cadc2c818ef10a62b7521c3a3a863

  • SSDEEP

    1536:8gDktLw4rO10tMrlk3SJDlf98jqP+8il3CxOeZIckWlmyp:uLRrO10TiJD9yjqrilyxOuPp

Malware Config

Targets

    • Target

      36d3b558b8756a6f264a31a5ceb1fc10N.exe

    • Size

      90KB

    • MD5

      36d3b558b8756a6f264a31a5ceb1fc10

    • SHA1

      1818f8dbc1e6b7248863c5c67990f11b6dfdf658

    • SHA256

      5a2c3c9721441a6ed8f93fcb59ee1fe8c4d2ad4f7d8935195b0ee55e14b10c64

    • SHA512

      bb13d828bfdef3963f12a8516d2fc6a6b211d08bd966377e8b9be3f658266d71077cac880ab4921b26b0246b472b3a5e3e8cadc2c818ef10a62b7521c3a3a863

    • SSDEEP

      1536:8gDktLw4rO10tMrlk3SJDlf98jqP+8il3CxOeZIckWlmyp:uLRrO10TiJD9yjqrilyxOuPp

    • Blocklisted process makes network request

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks