General

  • Target

    d66e7b23bc909447e0e5e52c85c60ee62bb785419c5b66bcb04da9a53402f912

  • Size

    258KB

  • Sample

    240811-ddt1ms1hnp

  • MD5

    db21558922a70ca44b73bab04a6ae8e8

  • SHA1

    82d34b70aa58e6a0ac5794b3e9d1af08c6f3a9ac

  • SHA256

    d66e7b23bc909447e0e5e52c85c60ee62bb785419c5b66bcb04da9a53402f912

  • SHA512

    0e04bdabc7b26206f5f0e8733156441008e390059b124495a94d5c35a5e0d4964ba10bd6113338609d6bef78fbf139dc83769ce49ca4799380051f2f820408b0

  • SSDEEP

    6144:iyHJ4wTB5Ia9p+S0dSpTU+h/zquE1j57Lu6Bwc772:ig4wTvoS05kzNEj7Lu6n

Malware Config

Targets

    • Target

      d66e7b23bc909447e0e5e52c85c60ee62bb785419c5b66bcb04da9a53402f912

    • Size

      258KB

    • MD5

      db21558922a70ca44b73bab04a6ae8e8

    • SHA1

      82d34b70aa58e6a0ac5794b3e9d1af08c6f3a9ac

    • SHA256

      d66e7b23bc909447e0e5e52c85c60ee62bb785419c5b66bcb04da9a53402f912

    • SHA512

      0e04bdabc7b26206f5f0e8733156441008e390059b124495a94d5c35a5e0d4964ba10bd6113338609d6bef78fbf139dc83769ce49ca4799380051f2f820408b0

    • SSDEEP

      6144:iyHJ4wTB5Ia9p+S0dSpTU+h/zquE1j57Lu6Bwc772:ig4wTvoS05kzNEj7Lu6n

    • Deletes itself

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Writes to the Master Boot Record (MBR)

      Bootkits write to the MBR to gain persistence at a level below the operating system.

MITRE ATT&CK Enterprise v15

Tasks