General

  • Target

    1dbb39707d3209b502125cd97edc6cd4359b1c7a180a379826330a1aa440c4b8

  • Size

    192KB

  • Sample

    240806-mx9d4s1eka

  • MD5

    a8c271927ca8c75201e1cf1cbf39ffc1

  • SHA1

    364cc99fd92a5601b0cc44b9f9c4d806c88e7dd1

  • SHA256

    1dbb39707d3209b502125cd97edc6cd4359b1c7a180a379826330a1aa440c4b8

  • SHA512

    35cc6dc7ca5296c317dfc78a323400876959865b16e5a96e9434151c73ecc148273f257b0c3ee7db463f8640b147976e24f17b08036b2a6a9c475620c54723a0

  • SSDEEP

    3072:HRe+aezUDbHXtARYLJXJoYtpA/H3RpDecC+EZX70RjLTu46R0Eb:8+aezqgYLjvqXRpDecw7Kj3u46db

Malware Config

Targets

    • Target

      1dbb39707d3209b502125cd97edc6cd4359b1c7a180a379826330a1aa440c4b8

    • Size

      192KB

    • MD5

      a8c271927ca8c75201e1cf1cbf39ffc1

    • SHA1

      364cc99fd92a5601b0cc44b9f9c4d806c88e7dd1

    • SHA256

      1dbb39707d3209b502125cd97edc6cd4359b1c7a180a379826330a1aa440c4b8

    • SHA512

      35cc6dc7ca5296c317dfc78a323400876959865b16e5a96e9434151c73ecc148273f257b0c3ee7db463f8640b147976e24f17b08036b2a6a9c475620c54723a0

    • SSDEEP

      3072:HRe+aezUDbHXtARYLJXJoYtpA/H3RpDecC+EZX70RjLTu46R0Eb:8+aezqgYLjvqXRpDecw7Kj3u46db

    • Deletes itself

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v15

Tasks