General

  • Target

    2024-08-10_ebed66257683ad93867cf778c9cd5240_avoslocker

  • Size

    1.5MB

  • Sample

    240810-c1ph1awclg

  • MD5

    ebed66257683ad93867cf778c9cd5240

  • SHA1

    b45d1098ae73dbea15d47ac52e9ef5044b2cd58d

  • SHA256

    887e3dac1e74e69cfa8d52f472219450f46e95d04a8cbc070f30e653de236b55

  • SHA512

    1b6f0c7038883fff77666f621de108f1ea5a284908320d91bfd0da84859da6967e883c0edabe7148691743669b5d2df7a2cc3c124782fe31ea0516017ebc76b4

  • SSDEEP

    49152:t+ls+YuQrP1ecUT1Yasef9Ckt7c20+9qNxUW:t+ls+YuQrP1yBfEkKK90

Malware Config

Targets

    • Target

      2024-08-10_ebed66257683ad93867cf778c9cd5240_avoslocker

    • Size

      1.5MB

    • MD5

      ebed66257683ad93867cf778c9cd5240

    • SHA1

      b45d1098ae73dbea15d47ac52e9ef5044b2cd58d

    • SHA256

      887e3dac1e74e69cfa8d52f472219450f46e95d04a8cbc070f30e653de236b55

    • SHA512

      1b6f0c7038883fff77666f621de108f1ea5a284908320d91bfd0da84859da6967e883c0edabe7148691743669b5d2df7a2cc3c124782fe31ea0516017ebc76b4

    • SSDEEP

      49152:t+ls+YuQrP1ecUT1Yasef9Ckt7c20+9qNxUW:t+ls+YuQrP1yBfEkKK90

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks